ForensicsWiki will continue to operate as it has before and will not be shutting down. Thank you for your continued support of ForensicsWiki.

Difference between pages "Internet Explorer" and "Afentis forensics"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(External Links)
 
(External Link)
 
Line 1: Line 1:
{{Expand}}
 
  
Microsoft Internet Explorer (MSIE) is the default [[Web Browser]] included with [[Microsoft Windows]].
+
== Afentis Forensics ==
  
== MSIE 4 to 9 ==
+
Scientific support and investigation practice with expert witnesses providing DNA analysis, fingerprint evaluations, firearm evidence, mobile telephone examinations and Cell Site Analysis (CSA) - from crime scene to court.
MSIE 4 to 9 uses the [[Internet Explorer History File Format]] (or MSIE Cache File format). The Cache Files commonly named index.dat are used to store both cache and historical information.
+
  
== MSIE 10 ==
+
Produce a number of eDiscovery and digital evidence software tools, including:
  
<pre>
+
[http://www.facebookforensics.com/ Facebook Forensic Toolkit]
C:\Users\%USER%\AppData\Local\Microsoft\Windows\WebCache\
+
</pre>
+
  
To do: confirm if these files are in the [[Extensible Storage Engine (ESE) Database File (EDB) format]]
+
[http://www.linkedinforensics.com/ LinkedIn Forensic Toolkit]
  
== Configuration ==
+
[http://www.youtubeforensics.com/ YouTube Forensic Toolkit]
Internet Explorer will apply its setting in the following order, where the lower the order overrides settings in the higer order.
+
# Settings in Machine policy key
+
# Settings in User policy key
+
# Settings in User preference key
+
# Settings in Machine preference key
+
  
Machine policy key
+
[http://www.tumblrforensics.com/ Tumblr Forensic Toolkit]
<pre>
+
HKET_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
+
</pre>
+
  
Machine preference key
 
<pre>
 
HKET_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
 
</pre>
 
  
User policy key
+
== External Link ==
<pre>
+
HKEY_CURRENT_USER\SOFTWARE\Policies\Microsoft\Windows\CurrentVersion\Internet Settings
+
</pre>
+
  
User preference key
+
[http://www.afentis.com/ Official Website]
<pre>
+
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
+
</pre>
+
 
+
=== Security Zones ===
+
0 - My Computer
+
 
+
1 - Local Intranet Zone
+
 
+
2 - Trusted Sites Zone
+
 
+
3 - Internet Zone
+
 
+
4 - Restricted Sites Zone
+
 
+
5 - Custom
+
 
+
=== WPAD ===
+
 
+
== See Also ==
+
* [[Internet Explorer History File Format|Internet Explorer 4-9 Cache File Format]]
+
 
+
== External Links ==
+
* [http://kb.digital-detective.co.uk/display/NetAnalysis1/Internet+Explorer+Cache Internet Explorer Cache]
+
* [http://support.microsoft.com/kb/182569 Internet Explorer security zones registry entries for advanced users], by [[Microsoft]]
+
* [http://technet.microsoft.com/en-us/library/cc302643.aspx Troubleshooting Automatic Detection], by [[Microsoft]]
+
* [http://www.microsoft.com/en-us/download/details.aspx?id=11575 Windows Virtual PC VHDs for testing websites with different Internet Explorer versions], by [[Microsoft]]
+
* [http://www.swiftforensics.com/2011/09/internet-explorer-recoverystore-aka.html Internet Explorer RecoveryStore (aka Travelog) as evidence of Internet Browsing activity], by [[Yogesh Khatri]], September 29, 2011
+
* [http://tojoswalls.blogspot.ch/2013/05/java-web-vulnerability-mitigation-on.html Java Web Vulnerability Mitigation on Windows], by Tim Johnson, May 23, 2013
+
 
+
=== Internet Explorer 10 ===
+
* [http://cyberarms.wordpress.com/2012/08/21/windows-8-forensics-internet-cache-history/ Windows 8 Forensics: Internet History Cache], by Ethan Fleisher, August 21, 2012.
+
 
+
[[Category:Applications]]
+
[[Category:Web Browsers]]
+

Revision as of 17:36, 26 May 2014

Afentis Forensics

Scientific support and investigation practice with expert witnesses providing DNA analysis, fingerprint evaluations, firearm evidence, mobile telephone examinations and Cell Site Analysis (CSA) - from crime scene to court.

Produce a number of eDiscovery and digital evidence software tools, including:

Facebook Forensic Toolkit

LinkedIn Forensic Toolkit

YouTube Forensic Toolkit

Tumblr Forensic Toolkit


External Link

Official Website