• Shopping Cart Shopping Cart
    0Shopping Cart
Digital Detective
  • Home
  • Corporate
    • About Us
      • Executive Team
      • Our Clients
      • Testimonials
    • News and Events
      • Latest News
      • Press Release
    • Legal
      • Privacy Policy
      • Cookie Policy
      • Returns Policy
  • Products
    • Forensic Software
      • NetAnalysis®
      • HstEx®
      • Blade®
    • Downloads
      • Evaluation Request
      • Free Digital Forensic Tools
    • Product Documentation
      • NetAnalysis® Documentation
      • HstEx® Documentation
      • Blade® Documentation
  • Careers
  • Support
    • Knowledge Base
    • Support Portal
    • Digital Forensics Forum
  • Store
    • Forensic Software
    • View Shopping Cart
  • Blog
  • Contact Us
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu

DCode™ – The Digital Detective’s Companion Across Time

Digital Forensic Software, Digital Forensics, Forensic Analysis
DCode Decoding Windows Filetime Hex ValueDigital Detective©

Decoding the Mysteries of Time with DCode™ v5.6 In the intricate tapestry of digital forensics, where every digital footprint tells a story, timestamps serve as the silent guardians of truth. Welcome to DCode™ – The Digital Detective’s Companion Across Time, where we embark on a journey to decode the mysteries of time with precision and […]

Read more →
7th May 2024/by Craig Wilson

Deciphering Seagate Date Codes [Free Tool]

Data Recovery, Digital Forensics, Forensic Analysis, Forensic Investigations
Seagate Hard Disk

Why is this Important? During a forensic examination, establishing a timeline of events is usually an important aspect in the analytical process. This may involve you having to identify when a hard disk was manufactured. If you are a data recovery engineer, this information can also be useful when trying to identify donor drives and […]

Read more →
5th September 2023/by Craig Wilson

Forensic Analysis of the Zone.Identifier Stream

Digital Forensics, Forensic Analysis, Forensic Investigations
Security Link with Hand Cursor

Zone Identifier, ADS and URL Zones If you are new to the field of digital forensics, you may not be aware of Zone Identifiers, Alternate Data Streams (ADS) or URL Zones. If that is the case, then you have come to the right place. We shall explain all and show you exactly how they can […]

Read more →
8th October 2021/by Craig Wilson

Understanding Big and Little Endian Byte Order

Digital Forensics, Forensic Analysis, Learning Digital Forensics
Hex viewer showing some highlighted bytes

There are two different methods for describing the order in which a sequence of bytes are stored in digital systems: Big Endian: places the most significant byte first (also known as network byte order) Little Endian: places the least significant byte first Etymology The term endian comes from the novel Gulliver’s Travels by Jonathan Swift. […]

Read more →
8th August 2018/by Craig Wilson

Introduction to Number Systems

Digital Forensics, Forensic Analysis, Learning Digital Forensics
Introduction to Number Systems

Understanding Number Systems Number systems use different number bases. A number base indicates how many different digits are available when using a particular numbering system. For example, decimal is number base 10, which means it uses ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8 and 9. Binary is number base 2, which […]

Read more →
20th July 2018/by Craig Wilson

Character Encoding: A Quick Primer

Digital Forensics, Forensic Analysis, Learning Digital Forensics
Image showing keyboard with the text Understanding Encoding

Introduction to Character Encoding Understanding how Character Encoding works is an essential part of understanding digital evidence. It is part of the common core of skills and knowledge. A character set is a collection of letters and symbols used in a writing system. For example, the ASCII character set covers letters and symbols for English […]

Read more →
17th July 2018/by Craig Wilson

Potentially Serious Issue with the Analysis of Mounted File Systems

Digital Forensics, Forensic Analysis, Forensic Investigations
Yellow warning side with black text showing danger

Introduction When using third party image mounting tools to perform the forensic examination of NTFS file systems, it is extremely important to understand NTFS Junction Points so that you don’t find yourself making a critical mistake during your analysis. An issue has been identified with third party image mounting software where NTFS junction points are […]

Read more →
30th April 2014/by Craig Wilson

Blade® v1.9 Released – AFF® Support, Hiberfile.sys Conversion and New Evaluation Version

Blade®, Data Recovery, Digital Forensics, Forensic Analysis
Digital Detective Blade® logo on top of a open hard disk drive

Introduction to Blade® v1.9 We are pleased to announce the release of Blade v1.9.   This release of Blade® brings a number of fixes and some great new features.  This is the first release of Blade® to have evaluation capabilities which allow the user to test and evaluate our software for 30  days. When Blade™ is installed […]

Read more →
15th February 2012/by Craig Wilson

Random Cookie Filenames

Digital Forensics, Forensic Analysis, Forensic Investigations, Web Browser Forensics
Cookies next to a laptop keyboard

Internet Explorer Data As forensic examiners will be aware, Microsoft Internet Explorer stores cached data within randomly assigned folders. This behaviour was designed to prevent Internet data being stored in predictable locations on the local system in order to foil a number of attack types. Prior to the release of Internet Explorer v9.0.2, cookies were […]

Read more →
14th September 2011/by Craig Wilson

Userdata History Type in Internet Explorer

Digital Forensics, Forensic Analysis, Web Browser Forensics
Hands typing on computer keyboard

Introduction to Userdata Internet Explorer 8+ user data persistence is a function which allows online forms to save a small file to the system with information about values entered in a particular form.  This allows the user to retrieve a half filled web based form when they revisit. Persistence creates new opportunities for website authors.  Information […]

Read more →
18th January 2011/1 Comment/by Craig Wilson
Page 1 of 212

Categories

Recent Posts

  • NetAnalysis® 4: Boost Your Digital Forensics with Advanced Browser Analysis
  • DataDump™ – Data Extractor and Converter
  • DCode™ – The Digital Detective’s Companion Across Time
  • NetAnalysis® v3.8: Enhanced Browser Support for Digital Forensic Investigations
  • NetAnalysis® v3.7 and HstEx® v5.7 Released

Tags

ACPO Alternate Data Stream Android AOL Binary Coded Decimal BOM Browser Evidence Byte Order Mark Change Log Date & Time Decode Dongle Hell Dongles Donor Drive Email Recovery Encode Find Panel Free Good Practice GSM Guidelines Intelli-Carve Internet Explorer iOS Legal Licensing Linux macOS Network Byte Order News NTFS PFC Preferences Prefs PrivacIE Release Notes Seagate Search Symbolic Links Syntax Timestamp Timestamps Tools Tutorial Zone.Identifier

About US

Digital Detective enhances digital forensic science though cutting edge research and development. We offer a range of products and services for digital forensic analysis and advanced data recovery.

Product tags

Browser Forensics Cached Page Rebuilding Data Recovery Deleted Data Extraction Deleted Data Recovery Digital Forensic Software Product Bundles SMS Upgrade Web Browser Analysis Web Browser Forensics

Select Language

Translate our site by selecting your language from the option below.

Contact Us

Digital Detective Group
Motis Business Centre
Cheriton High Street
Folkestone
KENT, CT19 4QJ
United Kingdom

///courts.endearing.bulbs
+44 (0) 20 3384 3587

© Copyright - Digital Detective - Enfold Theme by Kriesi
  • Link to Facebook
  • Link to X
  • Link to Youtube
  • Link to Mail
  • Home
  • Sitemap
  • Corporate
  • Products
  • Store
  • Blog
  • Contact
Scroll to top Scroll to top Scroll to top