The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, Android devices become more and more popular, which attracts the attention of the forensics workers. As Android devices have a perfect security mechanism, the root privileges of Android devices are required to obtain electronic evidence effectively. The existing methods of obtaining the root privileges in Android devices mainly based on the third-party tool. Although the methods are widely...
With the widely use of smart phones, Android devices have become an important data source in forensic investigation, and many tools which collecting data from Android devices have also been introduced. However, most current studies consider only flashing the NAND card, nearly paying attention to eMMC card. Therefore, based on Android Recovery Mode, our paper designed a general forensic tool giving...
In Internet era, instant messaging software are closely linked with Net users. However, with enormous growth of instant messaging software users, a lot of lawbreakers carry out criminal activities using them as a medium. Then, mining and analyzing the useful clues from raw data left on the computer has become a significant means and research area for investigation and forensics. In this paper, taking...
Nowadays, E-mail communication has been abused for numerous illegitimate purposes such as E-mail spamming, terrorist attack, business fraud, etc. As a result, to analysis the rich personal information hidden in E-mail is significant for investigation and evidence collection. In this paper, an investigation and analysis system aiming to Email was presented, which supports a variety of data sources...
The data file of downloading records in the P2P downloading software contain the rich personal information. So mining and analyzing the useful clues inside has become a significant means and research area for the computer investigation and forensics. The Thunder which is the typical representative of P2P downloading software and the most popular in China has been emphatically analyzed in this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.