RSS Feed
Knowledgebase : P2C
We are constantly updating our YouTube Channel with How-To videos for our customers with Paraben's E3 Software.  Check them out and subscribe! https://www.youtube.com/user/ParabenForensics  [https://www.youtube.com/user/ParabenForensics]
How to Turn ON and Collect Logs within E3 * Case * Options * Check  * Enable exteded logs * Enable logging for plug-ins * Enable serial log during mobile acquisition (IF acquiring a mobile device) * REPRODUCE THE ISSUE * Archive folder...
E3 provides several engines for detect malware or suspicious files. The first one can scan any added evidence. This is malware scan from content analysis. However, it searches for malware in Windows PE files. For example it will find unsigned files or m...
Extended logs collection can be especially useful if you have any difficulties while working with P2C. To collect required logs please follow the step-by-step instruction below: * Start P2C and go to Case/Options. * Check "Enable extended logs" an...
P2C is designed to run under Windows Vista, Windows 7, Windows 8 and 8.1, and Windows 10 both 32-bit and 64-bit. IF YOU HAVE PROBLEMS RUNNING P2C UNDER WINDOWS VISTA, WINDOWS 7, WINDOWS 8, WINDOWS 8.1, OR WINDOWS 10, PLEASE, DO THE FOLLOWING: * Inst...
P2C ACTIVATION When you purchase P2C, you are proposed to select the type of activation for the product. Such types of activation are available: * Dongle licensing * Activation key licensing IF YOU SELECT THE DONGLE LICENSING: Install P2C and plug...
If the East Asian Languages are used in evidence being investigated, normally, it is not necessary to make any further adjustments. In case the symbols are displayed incorrectly, do the following to make P2C show them properly: * Call the CONTROL PA...
There are advanced, keyword search and sorted files search. Advanced search is a common search engine with powerful customization. It helps to customize a lot of options to get the most accurate results. For example user can search for HEX or text, use ...
It works for system drive or dumps with system drives. It searches for supported email databases, chat databases, registry information, browser data, recently used files and documents folder.
Forensic container is specially designed secure database. Data in forensic containers is encrypted and locked by password. Only E3 and Evidence Reviewed can provide access to data in the database. DP2C and FF sticks collects data to forensic containers. A...
During logical acquisition we get logical structure and its related data, in other words we copy all available files from the file system to a case. Logical acquisition has some limitations related to a device restrictions. Usually, we can’t get all files...
Usually, we get data in its raw format as dumps or databases. So it is not really easy and not comfortable for users to work with such data. For example they need to know where a system stores useful data. It is a big problem to find it within all system ...