iForensics Blog

ChallengesOfAudioEDiscovery 0

Challenges of Audio eDiscovery

Introduction Have you ever heard of audio eDiscovery? Last year Swiss FTS were given an opportunity to enter this fascinating field. While projects in this field have traditional eDiscovery considerations, such as the quantity...

messy_documents_banner 9

Deduplication Hidden Downsides

Introduction Deduplication is often used in document reviews to reduce the amount of data to be searched or reviewed. When multiple files have identical content, only one version is kept. Hash values such as...

digital_fingerprint_banner2 1

Nuix and the MD5 Conundrum

Introduction MD5 hashes are usually described as “electronic fingerprints”. They are widely used as unique identifiers for electronic data. They allow to testify the integrity of files or to prove that two files have...

puzzle_banner2 5

Nuix Immaterial Items, the Grey Area

  Introduction Nuix documentation (v5.2.1_0 p. 53-54) describes the immaterial items as follows: Immaterial items are those items that are extracted for forensic completeness, but do not necessarily have intrinsic value in a legal...

OCR_banner 1

Optical Character Recognition – OCR

Introduction Most forensic tools allow you to easily search through a text file or a simple document. However, an image could potentially contain text. This is typically the case for non-searchable PDFs, scanned documents,...

binary_eye2 0

Hello World

“Hello World”, this is how every journey begins in IT. Although the purpose of iForensics’ journey isn’t to teach you programming, we respect traditions. Passion for computer forensics and eDiscovery has brought us together...