An Overview of the Jumplist Configuration File in Windows 7
<span style="font-family: Times New Roman; font-size: small;"> </span><p class="AbstractText" style="margin: 6pt 40.25pt 6pt 42.55pt;"><span style="font-size: small;"><span style="font-family: Times New Roman;">The intro...
Main Authors: | Harjinder Singh Lallie, Parmjit Bains |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2012-03-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/42 |
Similar Items
-
Challenges in applying the ACPO principles in cloud forensic investigations
by: Harjinder Singh Lallie
Published: (2012-03-01) -
The Problems and Challenges of Managing Crowd Sourced Audio-Visual Evidence
by: Harjinder Singh Lallie
Published: (2014-04-01) -
Digital Forensics to Intelligent Forensics
by: Alastair Irons, et al.
Published: (2014-09-01) -
Automatically Identifying Configuration Files
by: Huang, Zhen
Published: (2009) -
Automatically Identifying Configuration Files
by: Huang, Zhen
Published: (2009)