Practice

79 results - showing 61 - 79
1 2 3 4
Ordering
31
This page contains links to compressed dd images used to test metadata based deleted file recovery forensic tools. Metadata...
29
This page has linkes to two dd images containing container files: files --- (MD5) 6782bae87146dd8bb4dc06ee7462d572 nests...
33
The following tools: Micro Systemation GSM .XRY v3.6, Guidance Software's Neutrino v1.4.14, Paraben's Device Seizure v2.1 build 3079.29886, Cellebrite...
31
The following binary images were created by performing either a JTAG or Chip-off data extraction technique. The...
33
The files contained in this archive can be used as a control to test the accuracy and effectiveness of...
34
Five memory images were created by Jesse Kornblum of ManTech . The archive, a .RAR file, (http://www.rarlab.com/) contains images...
32
The Rhino Hunt data set requires examination of a small image file and three network traces. This image...
35
This image (Encase, iLook, compressed dd) is to evaluate if an imaging tool can recognize the file systems...
29
The evil Boris and Natasha have escaped from jail and are up to their old tricks. They have stolen...
36
Background The drone images, research results and data on this page were produced as part of the...
33
The Windows registry is a system-defined database in which applications and system components store and retrieve configuration data. The...
45
The purpose of this work is to learn various types of data leakage, and practice its investigation techniques. ...
30
On 09/20/04 , a Dell CPi notebook computer, serial # VLQLW, was found abandoned along with a wireless PCMCIA...
29
This is a public resource for the improvement of students and professionals alike. We have released full Virtual Machine...
79 results - showing 61 - 79
1 2 3 4
Results per page: