Entries by Craig Wilson

, , ,

Binary-Coded Decimal Timestamps

Introduction Following on from the release of Digital Detective’s free DCode™ tool, we are compiling a series of blog posts explaining the various timestamp formats available in the new version. In this post, we are looking at Binary-Coded Decimal or BCD. Binary-Coded Decimal (BCD) Binary-Coded Decimal is a system for encoding decimal numbers as a […]

, , ,

Deciphering Seagate Date Codes

During a forensic examination, establishing a timeline of events is usually an important aspect of the analytical process; this may include establishing the manufactured date of a hard disk drive. In a data recovery scenario, this information may be relevant when attempting to identify donor drives for a head swap. Many hard disks have this […]

, ,

NetAnalysis® v2.11 and HstEx® v4.11 Released

Introduction This release of NetAnalysis® adds support for the forensic analysis of two browsers which have been designed for the security/privacy market, Avast Secure Browser and CCleaner Browser. We have also added support for seventy-four new versions of other browsers. New Browser Support We have added support for the following browsers: Avast Secure Browser Avast […]

, ,

NetAnalysis® v2.9 and HstEx® v4.9 Released

Introduction This release of NetAnalysis® adds support for Basilisk Browser, Epic Privacy Browser, Cốc Cốc Browser and QQ Browser. We have also improved support for many of the existing browsers. Some notable new features include the update of our internal HTML Viewer, as well as adding some valuable new functionality to aid with evidence processing […]

, ,

Understanding Big and Little Endian Byte Order

There are two different methods for describing the order in which a sequence of bytes are stored in digital systems: Big Endian: places the most significant byte first (also known as network byte order) Little Endian: places the least significant byte first Etymology The term endian comes from the novel Gulliver’s Travels by Jonathan Swift. […]