Compute Forensics

Monday: 09:00 - 17:00
Tuesday: 09:00 - 17:00
Wednesday: 09:00 - 17:00
Thursday: 09:00 - 17:00
Friday: 09:00 - 17:00
Saturday: 09:00 - 17:00
Sunday: -

About Compute Forensics

Compute Forensics are the gold standard in computer forensics and mobile phone investigations in the UK. Corporate, private or legal no digital device is left unanalysed.

Compute Forensics Description

Computer forensics is an umbrella term for digital forensics which encompasses apple mac analysis, Windows analysis, data recovery, Facebook /MSN /Yahoo chat recovery and hex dumping (advanced mobile phone data recovery). If your inquiry involves a digital device, we can extract data from it.

Your computer investigation is conducted on an un-networked computer in an alarmed laboratory with restricted access. No members of the public have access to the examination rooms. Overnight, exhibits or personal data is stored in a bolted safe. All data is password encrypted using AES encryption. All data is wiped after forensic examination using a military standard algorithm. Data carries a a bar code, exhibit /continuation forms, tamper proof bag number and all necessary logs to ensure chain of custody. We can arrange our GPS tracked courier to pick up evidence /mobile phone /computer hard disk or do so through an analyst as we take data continuity seriously. We wouldn’t want to jeopardize the results of your computer investigation.

Reviews

User

Please like and share my video! #litigation #london #cybersecurity #ediscovery #computerforensics #infosec #hr #dfir #cybercrimeinvestigation #cybercrime #ediscovery #triage #incidentresponse #digitalforensics #lawfirms #legaltechnology #solicitors

User

https://compute-forensics.com/computer-fo rensic-blog/

User

Compute Forensics Ltd is proud to roll out our new REMOTE FORENSIC collection, data recovery, triage, pre-collection eDiscovery scoping and investigation services. It is like having an examiner on standby at your office! VISIT: https://compute-forensics.com/…/remote- data-collection-inv…/
Using a small bespoke forensic boot distribution and zero configuration AES + RSA ENCRYPTION an agent can now collect and inspect in minutes not days.
Just plug in an external USB 3.0 disk, ...your preconfigured boot disk/or USB made by simple burning software in minutes and an ethernet cable and an agent can take control of the system without changing the internal disk. Systems with BitLocker encryption can be imaged and triaged decrypted while in a blocked state remotely of provided with a password.
#investigation #litigation #london #cybersecurity #ediscovery #computerforensics #infosec #hr #dfir #cybercrimeinvestigation #cybercrime #ediscovery#triage #incidentresponse #digitalforensics #lawfirms #legaltechnology #encryption #solicitors
https://www.youtube.com/watch?v=widWhgoXI fI
See More

User

Happy Monday! I am just testing a tiny sized Windows-based triage tool with a remote connection facility. Now with a few simple steps, I can forensically collect, extract and triage a Windows, Mac or Linux System from anywhere in the world saving travel time, the internal disks are NOT altered. The technique and the tools used are open source. All the user has to do is burn an iso CD/DVD or receive a USB, press the system dependent boot menu, boot into the system, start the n...etwork, open the screen sharing app and email/txt me the code. Then I can control the system (with their permission!). Not only can I write their data to an encrypted disk for the mail the build also supports opening their BitLockered, Truecrypted, VeraCrypted disk in read-only mode decrypted for a targeted collection (in eDiscovery cases) or full physical for forensic instructions. The video shows the USB plugged into a test laptop and the remote controlling of the desktop allowing an examiner to use a forensic suite from anywhere. #DFIR #forensicservices #eDiscovery
See More

User

https://compute-forensics.com/free-cloud- based-ediscovery-…/

User

Eric Zimmerman has kindly posted a spreadsheet containing results of forensic imaging speeds of different software and hardware. Guymager v0.7.1 running on boot distro CAINE won 1st place imaging a 1TB Hitachi SATA disk connected Via eSATA in just 2 hours 30 minutes 7 seconds to 3 Spindle RAID 5 array destination disk. The resulting image size was nearly half the original size at 557.95GB. https://docs.google.com/…/1wXX5zYql7KIP grsDdt6S5bTuGt…/edit…

User

I can teach you to collect data and triage in your organisation, before handing over to police or a forensic expert, with just an average grasp of computers and very little equipment. https://compute-forensics.com/how-to-crea te-forensic-windo…/

User

For sale and setup, useful for a student, gamer, video editor, audio technician or budding eDisocovery or Forensic examiner. https://www.ebay.co.uk/itm/192487815813†¦

User

Please read, like and share my guide on how to make a Windows/Linux computer forensic image bootable in VirtualBox for free as to see the suspects system as they did. https://compute-forensics.com/how-to-make -a-computer-foren…/

User

Please like, share or comment. https://compute-forensics.com/top-ten-fre e-computer-forens…/

User

[Updated] Proofinder is no longer available from Nuix, nearest thing is Intella's PI.

User

I attended the 'ASEAN Digital Economy' meeting King's College London London last night. Rozana Binte Abdul Majid of the Dept HC of Singapore in London, Allen Lai of the UK-ASEAN Business Council (UKABC), Donny Hutabarat of the National Bank of Indonesia London Office and Paul Smith global firm NashTech Limited gave insightful talks. Some very encouraging figures regarding projections of the Digital Economy in ASEAN (see fig 1). There will be extensive skill gaps to fill by fo...reigners and newly trained citizens of the region if the individual local governments of the less developed countries fail to invest. Additionally, it seems infrastructure issues in rural areas could pose a block to development causing issues such as low internet speeds. I predict IT security issues as the demand will outstrip the levels of IT security professionals leading to an Equifax Personal Information type disaster unless the security skill gap is filled. Overall the destiny of the region seems bright, but people will have to train to adapt to the revolution.
See More

User

Always great to get another honour for my work, this instruction kept me up 24hrs on the weekend to complete. The labour is no problem to me as the client will come back for more business in the future. I am available around the ASEAN (Cambodia, Thailand, Laos, Vietnam, Philippines) region should you wish to instruct my co-worker or I.

User

Using log2timeline CF LTD were able to timeline a mobile device belonging a young male accused of rape. The facts point to his innocence. The police, on this occasion, were not able to recover these artefacts. https://medium.com/dfc…/how-to-use-log2 timeline-54377e24872a

User

Trace your IP with this link. Without a VPN passwords can be stolen from public WIFI spots via the air. Please share this link! It only costs around £30 for a year and up to five devices protected! https://goo.gl/Op58Nh

User

Please share and like! https://www.linkedin.com/…/hr-dont-thro w-away-reuse-ex-empl…

More about Compute Forensics

Compute Forensics is located at 15 Old Bailey, EC4M 7EF London, United Kingdom
London (0203) 5989658
Monday: 09:00 - 17:00
Tuesday: 09:00 - 17:00
Wednesday: 09:00 - 17:00
Thursday: 09:00 - 17:00
Friday: 09:00 - 17:00
Saturday: 09:00 - 17:00
Sunday: -
http://compute-forensics.com/