Quantcast
Channel: Meridian Discovery | e-Discovery, Computer Forensics, Hosting » How-to
Browsing all 5 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Validating Copy Results Using md5deep

In our previous post Robocopy in e-Discovery, we wrote about copying electronic evidence using Robocopy and preserving file system metadata. Robocopy is a great tool for copying files, but it does not...

View Article



Image may be NSFW.
Clik here to view.

Transferring Electronic Evidence in File Containers

A vast amount of electronic evidence is being transmitted everyday via electronic file transfers among corporations, law firms and e-Discovery service providers. Most of these transfers involve...

View Article

Image may be NSFW.
Clik here to view.

Why Windows Sorts Numeric File Names Differently

File names are stored as strings in almost every operating system and database management system. While this works well in most cases, it causes files with names containing numerals to be sorted...

View Article

Image may be NSFW.
Clik here to view.

E-mail Conversation Index Analysis for Computer Forensics

E-mail messages contain numerous metadata fields that are utilized by computer forensic examiners as well as legal teams. One key MAPI property that is frequently extracted by computer forensics and...

View Article

8 Tips for Preparing a Proper TIFF Production

Legal teams often choose to prepare image productions accompanied by load files, and many of them make simple mistakes or bad choices that make it unnecessarily difficult for the recipient to utilize...

View Article

Browsing all 5 articles
Browse latest View live




Latest Images