National Center for Missing and Exploited Children
federal rules of evidence
September 7, 2017
Cryptographers (the people who make and break codes) have told us not to use the MD5 algorithm for twenty years. Why are we still using it?
MD5 and SHA-1 are the two hash algorithms that are used to verify the authenticity of digital evidence. Both algorithms have sec...
Understanding NCMEC CyberTipline Reports
August 30, 2019
What is a server?
September 3, 2018
March 26, 2018
Magnet Certified Forensics Examiner
November 15, 2017
Guidance Software Forensic Bug Bounty
October 13, 2017
Can't our IT person take a look?
October 2, 2017
Updates - 9/13/2017
September 14, 2017
Stop Using MD5
HG Experts Article: Deleted Files
September 6, 2017
What happens when you delete a file?
September 2, 2017
This was originally posted on LinkedIn and on the Trace Digital Forensics blog on the old website. I'm reposting it here because I think the content...
What can we get from digital forensics?
September 1, 2017
Investigations into child pornography offenses often begin with the receipt of a CyberTipline Report from the National Center for Missing and Exploite...
August 2019 (1)
September 2018 (1)
March 2018 (1)
November 2017 (1)
October 2017 (2)
September 2017 (7)
August 2017 (1)