Tips & Tricks

Pinpoint Labs New FAQ’s

A new Q&A resource is available from Pinpoint Labs. Many popular features and commonly asked questions are covered. Pinpoint Labs – Frequently Asked Questions web page link: http://pinpointlabs.com/answers/ PRODUCT CATEGORIES: SafeCopy Desktop SafeCopy Portable (Nomad) SafeCopy Server Harvester Portable Harvester Server Portable License Manager SharePoint Collector

read more

LegalTech New York 2013

It’s hard to believe that LegalTech New York is upon us again. Pinpoint Labs will have representatives in New York next week, 28th – 31st , and we wanted to invite you to attend one of our sessions at the Sheraton Hotel if you will be in town. Here is...

read more

Mac Target Disk Mode

Booting an Apple Macintosh in target disk mode allows computer forensic examiners to copy relevant files from the internal drive on a Mac computer. Removing hard drives instead from a Mac computer can be time consuming and result in damage to the system when not performed properly. Therefore, target disk...

read more

ESI Self Collection Drives and Kits

Electronically Stored Information (ESI) self collection drives and kits have become popular in the last few years because they offer an affordable means of collecting electronic data for a legal matter without the need to hire in expensive forensic experts. This article covers what should be included in an ESI...

read more

What is a Hash Value?

A hash value is a result of a calculation (hash algorithm) that can be performed on a string of text, electronic file or entire hard drives contents. The result is also referred to as a checksum, hash code or hashes. Hash values are used to identify and filter duplicate files...

read more

ESI (Electronically Stored Information) Software Challenges

A couple weeks ago, I outlined what computer forensics and electronic discovery have in common and how they differ. I’d like to expand on this topic by identifying some common obstacles encountered when using popular computer forensic software for typical electronic discovery projects. A typical computer forensic case may involve:...

read more

Recovering Deleted Email

It’s important to understand that deleted email is not recovered or indexed using common litigation support or electronic discovery software. These applications only process email that is still visible within the email software. Some email recovery software can also fall short when restoring deleted email records. Why is that? Because...

read more

What does ‘CCE’ Mean?

The CCE (Certified Computer Examiner) is a certification obtained through ‘The International Society of Forensic Computer Examiners’ (ISFCE). I’ve noticed that many CCE training facilities are geared towards criminal investigations so they don’t necessarily address civil litigation processes and ESI (Electronically Stored Information) requirements. This is because the CCE was...

read more

Encrypted Hard Drive Dangers

You have requested a hard drive clone or image and discover that the contents cannot be culled or reviewed. One reason may be hard drive encryption. Encryption involves ”scrambling” the contents of a file or hard drive so that they cannot be viewed without the appropriate key or password. To...

read more

Pinpoint Labs