{"id":4418,"date":"2023-05-30T15:07:12","date_gmt":"2023-05-30T09:37:12","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=4418"},"modified":"2023-05-31T14:31:52","modified_gmt":"2023-05-31T09:01:52","slug":"olk-file-forensics-examine-evidence","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/","title":{"rendered":"OLK File Forensics &#8211; Examine OLK14 File and Export Evidence"},"content":{"rendered":"<p style=\"text-align: justify;\">Do you want to perform OLK file forensics to carve out evidence? Then, read this blog and explore the best approaches to investigating OLK files without any hassle.<\/p>\n<p><span style=\"font-weight: 400;\">OLK files generally belong to Microsoft Outlook for Mac. It is <\/span><span style=\"font-weight: 400;\">a proprietary file type used by Outlook as a database for storing message information. Typically, the header information of an email is stored in OLK files. <\/span>Since the data files are stored in the OLK folder, they can be solid evidence for investigation purposes. Therefore, these files are generally used by forensic experts for analysis purposes to carve those artifacts so as to smarty investigate the occurred cybercrime.<\/p>\n<h2 class=\"h4\">Overview &#8211; OLK File Format<\/h2>\n<p style=\"text-align: justify;\">OLK file format was developed by Microsoft, also known as Outlook Address Book File. <strong>OLK14<\/strong> are the email message files that are created by <strong>Outlook 2011 Mac<\/strong> client to store email data. <strong>OLK14MESSAGE<\/strong> files manage all the important information regarding the headers of emails collected in Outlook Mac 2011. <strong>OLK14MESSAGE<\/strong> file does not have the body of emails, instead, it only contains the header of emails. The body of an email is been stored in another OLK file format, i.e. <strong>OLK14MSGSOURCE<\/strong>. Along with this, OLK files store organizational data, addresses, contact information, phone numbers, etc.<\/p>\n<p>But, the thing is that sometimes it becomes impossible to open\u00a0 OLK files.<\/p>\n<h2 class=\"h4\">Why You Are Not Able to Open OLK Files?<\/h2>\n<p>You might still run into issues opening OLKs even with the right version of Microsoft Word installed. Other external problems could be to blame if the loading of OLK files continues to give you trouble. Problems unrelated to the software include:<\/p>\n<ul>\n<li>References to OLK files in the Windows Registry are incorrect.<\/li>\n<li>Unintentionally deleting the OLK file&#8217;s description from the Windows Registry.<\/li>\n<li>Microsoft Word or another OLK-related program that was improperly installed corrupted the OLK file.<\/li>\n<li>Malware has compromised OLK file integrity.<\/li>\n<li>OLK-related hardware uses out-of-date drivers.<\/li>\n<li>Not enough resources on the system to open files for Outlook Address Book File.<\/li>\n<\/ul>\n<p>So, when it comes to investigating Mac Outlook data, the forensics examiner looks for OLK files. Why? let&#8217;s find out.<\/p>\n<h3 class=\"h4\">OLK File Forensics Investigation<\/h3>\n<p>Generally, in a computer crime scene, culprits will first try to destroy the evidence by deleting crucial data which could have helped the investigators reach them.<\/p>\n<p>It may be easier for criminals to delete Outlook data files but not OLK files. Forget about deleting, OLK folders are difficult to locate in the first place. And, there is pretty much a chance that criminals may have skipped about deleting the evidence from these files. Considering the possibility of such a situation, forensic investigators first look at the OLK folders when examining Mac Outlook files.<\/p>\n<p style=\"text-align: justify;\">To examine OLK files, forensic examiners generally use advanced forensics tools like <a href=\"https:\/\/www.mailxaminer.com\/\" target=\"_blank\" rel=\"noopener\"><strong>MailXaminer<\/strong><\/a>. It helps investigators easily trace the facts of the crime scene and evidence with perfection in a systematic way.<\/p>\n<h3 class=\"h4\">An Ultimate Solution to Examine OLK File Using Professional Tool<\/h3>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.mailxaminer.com\/product\/\" target=\"_blank\" rel=\"noopener\"><strong>Email Forensic Software<\/strong><\/a> is the best software used by digital forensic experts to examine email data on a deeper level. The tool has a wide range of advanced features that make the process easy to find evidence. This tool <strong>supports 20+ email file formats<\/strong> which include OLK files as well. It has a Search-Based Analytics Feature and Powerful Search Mechanism based on algorithms that help to find the data related to the specified keywords mentioned in the search field. The software also has many more features that make it easy for the investigating officers to smartly analyze huge data.<\/p>\n<p style=\"text-align: justify;\">It is the best way to analyze email files in a secure and risk-free way. The software provides multiple features that are easy to use and give efficient results. It also recovers the deleted data automatically. After the examination process, users can easily export the evidential files into multiple file formats. In the next section, we are going to understand the process of examination of OLK files using this software.<\/p>\n<h3 class=\"h4\">Step-by-Step Process to Perform OLK14 File Forensics<\/h3>\n<p style=\"text-align: justify;\"><strong>Step 1: Add Evidence into the Software for OLK file forensics<\/strong><\/p>\n<p style=\"text-align: justify;\">To add the evidence to the software, users first have to select <strong>&#8220;OLM Identity&#8221;.<\/strong> Then, click on the <strong>\u201cNext\u201d<\/strong> button for further steps.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5632\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/Select-OLM-Identity.png\" alt=\"select olm identity\" width=\"1366\" height=\"728\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Step 2: Customize How The Evidence Will Be Scanned<\/strong><\/p>\n<p style=\"text-align: justify;\">After selecting the file format, the investigating officers need to select the desired options to customize how they want to scan their evidence.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5634\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/Add-evidence.png\" alt=\"configure\" width=\"1366\" height=\"726\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 3: Add Folder to Analyze the Evidence<\/strong><\/p>\n<p>After making the necessary configuration, investigators need to add folder for OLK file forensics.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5635\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/Add-folder.png\" alt=\"add folder\" width=\"1364\" height=\"727\" \/><\/p>\n<p>&nbsp;<\/p>\n<p style=\"text-align: justify;\"><strong>Step 4: Click &#8220;Finish&#8221;<\/strong><\/p>\n<p>After that click on the finish button to proceed further as shown in the figure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5636\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/Click-Finish-1.png\" alt=\"click finish\" width=\"1364\" height=\"727\" \/><\/p>\n<blockquote><p><strong>Note: <\/strong>The software offers <strong>advanced search functionality<\/strong>. Users can find suspected data by providing related keywords for the same. It provides various search options such as <strong>General Search, Proximity Search, Regular Expression, Stem Search, Fuzzy Search<\/strong>, and <strong>Wildcard Search<\/strong>. Besides this, logical operators such as <strong>AND, OR<\/strong>, and <strong>NOT<\/strong> can also be availed from the software panel to perform a precise search.<\/p><\/blockquote>\n<p style=\"text-align: justify;\"><strong>Step 5: Import Process Started Successfully.<\/strong><\/p>\n<p>Once you follow the above steps carefully, you will see the below on your screen.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-5637\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/After-Clicking-on-Finish.png\" alt=\"olk file forensics\" width=\"1366\" height=\"729\" \/><\/p>\n<blockquote><p><strong>Important Note:<\/strong><\/p>\n<p><strong>Multiple search analytics<\/strong> helps to find the relation and connections between the users and other entities of the data. It provides four features such as <strong>Word Cloud, Link Analysis, Timeline Analysis<\/strong>, and <strong>Entity Analysis<\/strong>. This analytics function of the software represents the connection between related data in a graphical representation and helps to analyze the emails conveniently.<\/p>\n<p><strong>Word Cloud<\/strong> \u2013 Word cloud analysis is used to represent the frequency of words of a particular email message by differ in size and color.<\/p>\n<p><strong>Link Analysis<\/strong> \u2013 It helps to find out the connection and relation between multiple emails that are connected to each other.<\/p>\n<p><strong>Timeline Analysis<\/strong> \u2013 This analysis feature helps the investigators to analyze the frequency of emails by particular month, year, and date.<\/p>\n<p><strong>Entity Analysis<\/strong> \u2013 This analysis has the ability to show the location-oriented words used within the email message along with their frequencies.<\/p><\/blockquote>\n<p><strong>Step 6: Export Evidence Report<\/strong><\/p>\n<p style=\"text-align: justify;\">After the analysis process, investigators can easily export the evidence report using the <strong>\u201cExport\u201d<\/strong> option. The tool provides multiple export file format options such as <strong>CSV, EML, MSG, HTML, TIFF, PST, PDF<\/strong>, etc. to export the analysis report. Users can save the report at the desired location of the local system.<\/p>\n<h3 class=\"h4\">Final Words<\/h3>\n<p style=\"text-align: justify;\">The OLK files created by Mac Outlook store the copy of email attachment files and OLK14Message files store the header information of emails. To analyze these files, investigating officers rely on professional OLK file forensics software. Thus, we recommend digital forensics experts use the above-mentioned software for carrying out a smooth investigation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Do you want to perform OLK file forensics to carve out evidence? Then, read this blog and explore the best <a href=\"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":5629,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,1],"class_list":["post-4418","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-file-format","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OLK File Forensics - Examine &amp; Export OLK 14 File Evidence Report<\/title>\n<meta name=\"description\" content=\"Get complete piece of information for OLK File Forensics. Examine and export OLK14MESSAGE and OLK14MSGSOURCE file with report.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OLK File Forensics - Examine &amp; Export OLK 14 File Evidence Report\" \/>\n<meta property=\"og:description\" content=\"Get complete piece of information for OLK File Forensics. Examine and export OLK14MESSAGE and OLK14MSGSOURCE file with report.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-30T09:37:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-31T09:01:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/olk-file-forensics.png\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"OLK File Forensics &#8211; Examine OLK14 File and Export Evidence\",\"datePublished\":\"2023-05-30T09:37:12+00:00\",\"dateModified\":\"2023-05-31T09:01:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/\"},\"wordCount\":1118,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/olk-file-forensics.png\",\"keywords\":[\"OLK File Forensics\"],\"articleSection\":[\"File Format\",\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/\",\"name\":\"OLK File Forensics - Examine & Export OLK 14 File Evidence Report\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/olk-file-forensics.png\",\"datePublished\":\"2023-05-30T09:37:12+00:00\",\"dateModified\":\"2023-05-31T09:01:52+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"Get complete piece of information for OLK File Forensics. Examine and export OLK14MESSAGE and OLK14MSGSOURCE file with report.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/olk-file-forensics.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/olk-file-forensics.png\",\"width\":700,\"height\":400,\"caption\":\"olk file forensics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/olk-file-forensics-examine-evidence\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"OLK File Forensics &#8211; Examine OLK14 File and Export Evidence\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OLK File Forensics - Examine & Export OLK 14 File Evidence Report","description":"Get complete piece of information for OLK File Forensics. Examine and export OLK14MESSAGE and OLK14MSGSOURCE file with report.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/","og_locale":"en_US","og_type":"article","og_title":"OLK File Forensics - Examine & Export OLK 14 File Evidence Report","og_description":"Get complete piece of information for OLK File Forensics. Examine and export OLK14MESSAGE and OLK14MSGSOURCE file with report.","og_url":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2023-05-30T09:37:12+00:00","article_modified_time":"2023-05-31T09:01:52+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/olk-file-forensics.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"OLK File Forensics &#8211; Examine OLK14 File and Export Evidence","datePublished":"2023-05-30T09:37:12+00:00","dateModified":"2023-05-31T09:01:52+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/"},"wordCount":1118,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/olk-file-forensics.png","keywords":["OLK File Forensics"],"articleSection":["File Format","Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/","url":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/","name":"OLK File Forensics - Examine & Export OLK 14 File Evidence Report","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/olk-file-forensics.png","datePublished":"2023-05-30T09:37:12+00:00","dateModified":"2023-05-31T09:01:52+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"Get complete piece of information for OLK File Forensics. Examine and export OLK14MESSAGE and OLK14MSGSOURCE file with report.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/olk-file-forensics.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/05\/olk-file-forensics.png","width":700,"height":400,"caption":"olk file forensics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/olk-file-forensics-examine-evidence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"OLK File Forensics &#8211; Examine OLK14 File and Export Evidence"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/4418","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=4418"}],"version-history":[{"count":0,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/4418\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/5629"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=4418"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=4418"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}