Recent Blogs & Updates

Learn to Examine Email Artifacts

Search Keywords in PDF With Guide to Find Multiple Terms

Tej Pratap Shukla | April 2, 2024 | Forensics | 7 Minutes Reading

Want to search keywords in PDF documents? Go through the write-up and get the complete procedure for doing so. PDFs Read More…

SeaMonkey Email Forensics & Overview

Mansi Joshi | April 2, 2024 | Forensics | 10 Minutes Reading

SeaMonkey, being an all-in-one Internet application suite containing a web browser, email client, HTML editor, and IRC client, becomes an Read More…

The Bat! — Email Forensics

Mansi Joshi | April 1, 2024 | Forensics | 6 Minutes Reading

The Bat! email-client is considered as one of the most secured email client designed for Windows OS. It comes as a Read More…

Find Credit Card Numbers in Files Tips for Cyber Crime Analysts

Tej Pratap Shukla | November 21, 2023 | Forensics | 10 Minutes Reading

During cybercrime investigations, detectives often have to find credit card numbers in files present across multiple digital sources. Moreover, as Read More…

Analyze Thunderbird MBOX Artifacts with Thunderbird Email Viewer

Tej Pratap Shukla | May 30, 2023 | Forensics | 6 Minutes Reading

Mozilla Thunderbird is a desktop-based email client which was released in the year 2004 and it has experienced vast growth Read More…

How to Check Properties of Multiple Emails via Single Solution

Tej Pratap Shukla | May 30, 2023 | Forensics | 4 Minutes Reading

Emails contain many fields that are meant to be hidden from the user. Most email clients ensure that the redundant Read More…

OLK File Forensics – Examine OLK14 File and Export Evidence

Mansi Joshi | May 30, 2023 | File Format, Forensics | 6 Minutes Reading

Do you want to perform OLK file forensics to carve out evidence? Then, read this blog and explore the best Read More…

AOL Email Forensics for Cybercrime Investigation

Mansi Joshi | November 16, 2022 | Forensics | 5 Minutes Reading

Nowadays the criminal activities like spoofing, social engineering, distribution of pornographic contents, cyber bullying etc. through the email exchanges are Read More…

Proper Tagging and Labeling of Evidence in Digital Forensics

Tej Pratap Shukla | November 13, 2022 | Forensics | 5 Minutes Reading

Often times, the investigators during the analysis process get innumerable thoughts with regards to the crime scene. However, after some Read More…

How to Search in Gmail Account Database? Complete Guide

Mansi Joshi | November 13, 2022 | Forensics | 4 Minutes Reading

In today’s world of digital communication, Gmail is used by almost everyone for personal as well as professional necessities. With Read More…