020 7193 4905
CaseNotes is Back!

CaseNotes is Back!

I wrote CaseNotes back in nineteen-canteen when I worked at another lab, and for some time now I’ve been frustrated at not being able to keep it up to date after I left. However, I now have CaseNotes back under my control and have released a whole load of updates,...
Trojan horse program (malware)

Trojan horse program (malware)

A medical research laboratory was alerted by anti-virus software to the presence of a Trojan horse program (malware) on one of its internet facing web servers. First Response was instructed to examine the system to determine if any user data had been lost. Analysis of...
Keywords, keywords, keywords!

Keywords, keywords, keywords!

Keyword searching has been used as a way to locate evidence from the very beginning of what we now refer to as data investigations, or digital forensics – that is the forensic analysis of digital or computer based data. Keywords are simply words or phrases that you...
The last word on keyword searches

The last word on keyword searches

In my last two posts on keyword searching, I’ve discussed what makes a good keyword, how to use keywords to locate the evidence you’re after and the concept of precise versus fuzzy searching. In this post, I want to round this all off with a few final thoughts and...