Spotlight is Apple’s Mac OS X content indexing and search feature. Like any other desktop search technology, it is aimed at helping the user find files and folders on the computer. Mac Spotlight indexes all the files/folders on a volume, storing indexed metadata about filesystem objects to deliver rapid and widespread searching capabilities across the […]
Mac OS X Spotlight
Apple Unified Log (AUL)
Apple Unified Logs was first implemented with Mac OS Sierra (10.12), launched on September 2016, Apple implemented a log system that is present not only in its laptops/desktops, but also on iOS devices (iPhone, iPad, iPod), Apple watches and Apple TV. The purpose was to unify and standardize the OS system logs. Apple Unified Logs […]
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags.” Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Mac OS X Spotlight
Apple Unified Log (AUL)
Apple Unified Logs was first implemented with Mac OS Sierra (10.12), launched on September 2016, Apple implemented a log system that is present not only in its laptops/desktops, but also on iOS devices (iPhone, iPad, iPod), Apple watches and Apple TV. The purpose was to unify and standardize the OS system logs. Apple Unified Logs […]
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags.” Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Apple Unified Log (AUL)
Apple Unified Logs was first implemented with Mac OS Sierra (10.12), launched on September 2016, Apple implemented a log system that is present not only in its laptops/desktops, but also on iOS devices (iPhone, iPad, iPod), Apple watches and Apple TV. The purpose was to unify and standardize the OS system logs. Apple Unified Logs […]
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags.” Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Android Forensics – What Lawyers Should Know
As opposed to iPhone devices, Android phones are produced by a plethora of makers, brands and models, from very simple to high end devices, they share similar protection security measures when we are dealing with new devices or new Android OS versions. In fact, like iPhones, Android device content is encrypted and protected from being […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags.” Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
Windows Shellbags
When a user changes the view mode or position of folders in the Windows graphic interface, the new view remains available because Windows remembers that information in the Windows Registry keys known as “Shellbags.” Perhaps more important, Shellbags store timestamps for some of the changes, making possible to determine access chronology. Like other Windows’ artifacts, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
iPhone Forensics – What Lawyers Should Know
While the common procedure to forensically process a laptop or desktop involves an image of its data repositories (meaning the disk or disks where the information being handled by the device, including it OS, is stored), this is not the case when the device is a smartphone. Although in this post we address only iPhones, […]
