Forensic Services
For Network Forensic Services Please Visit our Network Forensics page.
Computer Hardware Forensic Services
Deleted File Recovery with Date Codes (Data Forensics or Data Investigation)
Our computer forensic experts work side by side with your staff and may access data storage devices using recovery and analysis tools and techniques in an attempt to recover active and deleted data from inaccessible media and deleted files, including the Date Codes on all files (when the files were Created, Modified. or Last Accessed). Our computer forensic experts retrieve data from virtually all storage media and operating systems, including Windows 2000/XP, UNIX, Linux and Solaris.
Password Recovery
We are able to crack passwords for our clients allowing them access to their important files.
Currently we offer password removal for: Windows Vista/XP/2000/NT, Access, Outlook, Microsoft Office, QuickBooks, Act!, Acrobat. Microsoft Money, Internet Explorer, Quicken, Peachtree and more...
E-Mail Forensics and Recovery (Email Investigation)
In corporate mail environments, a user who intends to sneak data out of the company can attach a file to her outgoing message and send the le to any number of people, including competitors, ex-coworkers, or even foreign nationals. Fortunately, for us, we can track such activity via the corporate mail server.
Typically when an employee is being investigated, all of her past e-mail will be investigated to determine any wrongdoing or to build a case against her. The difficulty arises when users begin to access Web mail servers such as Yahoo! and Hotmail. These sites allow users to connect from within an organization, and attach the same file and mail it to the same people—but without leaving any sort of record of what they’ve done. Now, when an investigation is underway, the analyst or legal team cannot go back to the mail server and pull up records of that person’s activities.
Our Services Include.
Email recovery, extraction, de-duplication, and production in readable format, including attachments and timelines.
Our supported E-Mail clients are: Microsoft Outlook, Outlook Express, AOL and more...
Our Typical Cases Are.. email forensics, email investigation, deleted email recovery, email password recovery
PDA, Blackberry & iPod Forensics
Personal Digital Assistants (PDAs) are a relatively recent phenomenon, not usually covered in classical computer forensics. We have tools and expertise for capturing the contents off PDA's Blackberry's and iPods.
PDA is a handheld computing device that combines a multitude of functions and features including computing,telephone,fax,and Internet.Additionally,the PDA can and most often contains some form of networking or other form of connectivity capabilities.Today,a PDA is a powerful device that can function as a cellular phone,a fax sender,a Web browser,and a personal organizer.These devices have reached such a level of power and functionality that they are in essence a mini-computer.
The techniques for investigating a mobile device are similar to that of the more traditional storage devices;however,there are some notable differences that we need to be aware of while collecting potential evidence.