top of page
![](https://static.wixstatic.com/media/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg/v1/fill/w_1920,h_1080,al_c,q_90,enc_avif,quality_auto/11062b_2ccb88c1c6de4151b51879d6c90fca9df000.jpg)
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Navigating the Email Clients, Features of Modern Email Clients, Corrupted Email Archives](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
Apr 30, 20242 min read
Navigating the Email Clients, Features of Modern Email Clients, Corrupted Email Archives
What is Email client? An email client, often simply referred to as an "email program" or "email software," is a computer program or...
38 views0 comments
![](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
![Uncovering Hidden Email Attachments in Outlook’s Secure Temp Folder](https://static.wixstatic.com/media/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/5fb032_10f8c01ab19f4daab3a1199281b4d5f5~mv2.webp)
-
Apr 29, 20242 min read
Uncovering Hidden Email Attachments in Outlook’s Secure Temp Folder
Key Points: Did you know that when you open an email attachment in Outlook, it doesn’t just disappear after you close it? Outlook...
41 views0 comments
![Understanding OST and PST Files: A Guide for Email Forensics](https://static.wixstatic.com/media/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.webp)
-
Apr 28, 20242 min read
Understanding OST and PST Files: A Guide for Email Forensics
Why Local Email Clients Matter Webmail, which requires an internet to access messages, local email clients like Microsoft Outlook allow...
206 views0 comments
![Understanding Host-Based Email Stores in Digital Forensics](https://static.wixstatic.com/media/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.webp)
-
Apr 27, 20244 min read
Understanding Host-Based Email Stores in Digital Forensics
Updated on 28 Jan,2025 When investigating emails during digital forensic analysis, knowing where and how emails are stored locally can...
39 views0 comments
![Detailed explanation of SPF, DKIM, DMARC, ARC](https://static.wixstatic.com/media/5fb032_f476bf04359a441da5c33961b8bd7f65~mv2.png/v1/fill/w_387,h_300,fp_0.50_0.50,q_95,enc_auto/5fb032_f476bf04359a441da5c33961b8bd7f65~mv2.webp)
-
Apr 26, 20243 min read
Detailed explanation of SPF, DKIM, DMARC, ARC
Updated on 28 January, 2025 Email security has always been a challenge because the Simple Mail Transfer Protocol (SMTP) wasn’t built with...
44 views0 comments
![Deep Dive into Additional Email Header Fields in Digital Forensics](https://static.wixstatic.com/media/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_74bf36a689ef48fba16a78f8a2250863~mv2.webp)
-
Apr 25, 20242 min read
Deep Dive into Additional Email Header Fields in Digital Forensics
In our previous exploration of email headers, we delved into some of the most common and widely recognized fields like Message-ID and...
46 views0 comments
![Understanding Email Headers in Digital Forensics](https://static.wixstatic.com/media/5fb032_1fda356686664ac0a4fb91aff4849f4e~mv2.png/v1/fill/w_378,h_293,fp_0.50_0.50,q_95,enc_auto/5fb032_1fda356686664ac0a4fb91aff4849f4e~mv2.webp)
-
Apr 24, 20244 min read
Understanding Email Headers in Digital Forensics
Emails are an integral part of modern communication, serving as both a personal and professional lifeline. Behind the scenes of every...
82 views0 comments
![Analyzing Email Structures and Forensic Challenges](https://static.wixstatic.com/media/5fb032_2d1f195650d847cda4707a3cb1fdc805~mv2.png/v1/fill/w_330,h_255,fp_0.50_0.50,q_95,enc_auto/5fb032_2d1f195650d847cda4707a3cb1fdc805~mv2.webp)
-
Apr 23, 20242 min read
Analyzing Email Structures and Forensic Challenges
Emails, a ubiquitous form of communication in the digital age, hold a treasure trove of information for forensic investigators....
80 views0 comments
![Understanding the Email Forensic](https://static.wixstatic.com/media/5fb032_e9edc845279b4bc8b3d0309c831f1c37~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_e9edc845279b4bc8b3d0309c831f1c37~mv2.webp)
-
Apr 22, 20242 min read
Understanding the Email Forensic
Email forensics is indeed a powerful in the realm of digital investigations. 1. Who sent the email? Identifying the sender is pivotal as...
52 views0 comments
-
Apr 16, 20241 min read
Important Update: Temporary Pause in Blog Updates
Dear readers and followers, I hope this message finds you well. I wanted to take a moment to share an important update regarding our...
19 views0 comments
![Solid-State Drives (SSDs): Acquisition, Analysis, and Best Practices](https://static.wixstatic.com/media/5fb032_b93c4e4d55f040a98aa8a8bb2b3ae6d6~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_b93c4e4d55f040a98aa8a8bb2b3ae6d6~mv2.webp)
-
Apr 5, 20244 min read
Solid-State Drives (SSDs): Acquisition, Analysis, and Best Practices
Introduction: Solid-state drives (SSDs) have revolutionized data storage with their speed, reliability, and lack of moving parts....
21 views0 comments
![Alternate Data Streams (ADS)/(Zone.Identifier) in Forensic Investigations](https://static.wixstatic.com/media/5fb032_e05e7e66052e4b1b89c070f2f3c9b5a4~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_e05e7e66052e4b1b89c070f2f3c9b5a4~mv2.webp)
-
Apr 4, 20242 min read
Alternate Data Streams (ADS)/(Zone.Identifier) in Forensic Investigations
I will start with asking a question: Ever wonder how Office knows your document was "from the Internet? Understanding Alternate Data...
60 views0 comments
![Digital Evidence: Techniques for Data Recovery and Analysis](https://static.wixstatic.com/media/5fb032_c3925313ae1c4d8ebeb12404ec227e7e~mv2.png/v1/fill/w_454,h_341,fp_0.50_0.50,q_95,enc_auto/5fb032_c3925313ae1c4d8ebeb12404ec227e7e~mv2.webp)
-
Apr 3, 20243 min read
Digital Evidence: Techniques for Data Recovery and Analysis
In today's digital age, forensic investigators face the challenge of extracting valuable evidence from various storage devices, including...
50 views0 comments
![Program Execution : UserAssist Registry Key || Shimcache/Amcache ||BAM/DAM](https://static.wixstatic.com/media/5fb032_4e5fb235fee74053a9bd6f95a48a2c5c~mv2.png/v1/fill/w_426,h_258,fp_0.50_0.50,q_95,enc_auto/5fb032_4e5fb235fee74053a9bd6f95a48a2c5c~mv2.webp)
-
Apr 2, 20243 min read
Program Execution : UserAssist Registry Key || Shimcache/Amcache ||BAM/DAM
1. UserAssist Key Understanding the UserAssist Key: The UserAssist key, located within the NTUSER.DAT hive of the Windows registry,...
66 views0 comments
![Part 2: Windows Registry Artifacts: Insights into User Activity](https://static.wixstatic.com/media/5fb032_a6e1c7fc0d1a46edac2038500fb20384~mv2.png/v1/fill/w_454,h_312,fp_0.50_0.50,q_95,enc_auto/5fb032_a6e1c7fc0d1a46edac2038500fb20384~mv2.webp)
-
Apr 1, 20241 min read
Part 2: Windows Registry Artifacts: Insights into User Activity
5. Last Visited MRU/ Open Save MRU When you "save or open a file," Have you ever noticed that it might remember the location you...
44 views0 comments
![Part 1: Windows Registry Artifacts: Insights into User Activity](https://static.wixstatic.com/media/5fb032_9c397d585fb649efbdc5ca5049643482~mv2.png/v1/fill/w_454,h_303,fp_0.50_0.50,q_95,enc_auto/5fb032_9c397d585fb649efbdc5ca5049643482~mv2.webp)
-
Mar 31, 20242 min read
Part 1: Windows Registry Artifacts: Insights into User Activity
1. Search History: The "WordWheelQuery" registry key is a valuable artifact found in the Windows registry of Windows 7 to Windows 10...
48 views0 comments
![Part 4- Important Registries related to System configuration overview](https://static.wixstatic.com/media/5fb032_7a0cbc3a2e3245d282142b7d84e3167b~mv2.png/v1/fill/w_358,h_217,fp_0.50_0.50,q_95,enc_auto/5fb032_7a0cbc3a2e3245d282142b7d84e3167b~mv2.webp)
-
Mar 30, 20241 min read
Part 4- Important Registries related to System configuration overview
9. System Boot autostart programs: NTUSER.DAT NTUSER.DAT\Software\Microsoft\ Windows\CurrentVersion\Run NTUSER.DAT\Software\Microsoft\...
50 views0 comments
![Part 3- Important Registries related to System configuration overview](https://static.wixstatic.com/media/5fb032_89a13c0b4909408a9a499ba8a7bba110~mv2.png/v1/fill/w_328,h_199,fp_0.50_0.50,q_95,enc_auto/5fb032_89a13c0b4909408a9a499ba8a7bba110~mv2.webp)
-
Mar 29, 20243 min read
Part 3- Important Registries related to System configuration overview
8. Network profile key: -First and last name connected: Windows XP: The Legacy of Wireless Zero Configuration In the Windows XP era, the...
49 views0 comments
![Part 2- Important Registries related to System configuration overview](https://static.wixstatic.com/media/5fb032_33119181dcf14f5cb92e0029b98312fb~mv2.png/v1/fill/w_292,h_177,fp_0.50_0.50,q_95,enc_auto/5fb032_33119181dcf14f5cb92e0029b98312fb~mv2.webp)
-
Mar 28, 20243 min read
Part 2- Important Registries related to System configuration overview
5. NTFS last access time on/off The Misconception: One common misconception about last access timestamps is that they solely indicate the...
34 views0 comments
![Part 1- Important Registries related to System configuration overview](https://static.wixstatic.com/media/5fb032_076015b1588e477b83bc802b68900ee3~mv2.png/v1/fill/w_294,h_178,fp_0.50_0.50,q_95,enc_auto/5fb032_076015b1588e477b83bc802b68900ee3~mv2.webp)
-
Mar 27, 20242 min read
Part 1- Important Registries related to System configuration overview
1. Identify the Microsoft version: An investigator will receive a disk image and have no idea what the specific Windows operating system...
60 views0 comments
bottom of page