by admin-jon | Oct 10, 2012 | Blog, Collection, eDiscovery collections, Electronic Discovery Collection, ESI Collection, ESI Software, Legal Hold, Preservation, Software, Tips & Tricks
Booting an Apple Macintosh in target disk mode allows computer forensic examiners to copy relevant files from the internal drive on a Mac computer. Removing hard drives instead from a Mac computer can be time-consuming and damage the system when not performed...
by admin-jon | Oct 5, 2012 | Blog, Collection, Electronic Discovery Collection, ESI Collection, ESI Software, Legal Hold, Metadata, Preservation, Software
What is multi-threaded copying and why is it important? When a large number of computer files need to be copied from their current location to a network or external hard drive, the process could take many hours or even days. For example during a civil litigation case,...
by admin-jon | Jan 5, 2011 | Blog, Definition, Electronic Discovery, Electronic Discovery Collection, ESI Software
Saving clients money on electronic discovery processing is one of the challenges facing attorneys, service bureaus and their clients. Due to the amount of data collected when imaging custodian hard drives the resulting processing and labor costs can be significant and...
by admin-jon | Dec 21, 2010 | Blog, Collection, Electronic Discovery, Electronic Discovery Collection, ESI Collection, ESI Software, Legal Hold, Preservation, Tips & Tricks
Electronically Stored Information (ESI) self-collection drives and kits have become popular in the last few years because they offer an affordable means of collecting electronic data for a legal matter without the need to hire an expensive forensic expert. This...
by admin-jon | Dec 10, 2010 | Blog, Collection, Computer Investigations, Definition, Electronic Discovery, ESI Software, Preservation, Tips & Tricks
A hash value results from a calculation (hash algorithm) that can be performed on a string of text, electronic file, or entire hard drive contents. The result is also called a checksum, hash code, or hashes. Hash values are used to identify and filter duplicate files...