How cops investigate data on your computer - Digital Forensics

What I used to make my videos: ○ Microphone: ○ Pop filter: ○ Webcam: ○ Video editing software: More

Professional Data Recovery with $300 Data Recovery - Part 1

In this new series, Brian Cometa, owner of $300 Data Recovery in Los Angeles, California, exposes the tricks of the trade! Why is data recovery so expensive? How come $300 data recovery is... More

How to Track Stolen Phone? IMEI Tracking? Find IMEI of Stolen Phone? What to do?

Namaskaar Dosto, is video mein maine aapse ek important topic ke baare mein baat ki hai, ki agar aapka phone kho jaaye ya chori ho jaaye toh us lost phone ya stolen phone ko kaise recover kar... More

Top 10 free tools for digital forensic investigation

Read the full report here: We've compiled the top 10 free tools to help you become a super sleuth. http://digit... More

How to Tell If Your Phone Is Tapped

Watch more How to Make the Most of Your Cellphone videos: Step 1: Check battery life Take note of the lifespan of... More

How To Recover Files After Formatting Hard Drive - NEW 2018

How To Recover Files After Formatting Hard Drive or Any Other Reason PC: - Mac: - Need to recover deleted files, pictures, music, videos,... More

Remove Ransomware with Farbar Recovery Scan Tool by Britec

Remove Ransomware with Farbar Recovery Scan Tool by Britec Farbar Recovery Scan Tool, or FRST, is a portable application designed to run in the Windows Vista and Windows 7 Recovery Environment... More

Data recovery from burnt CCTV

Kroll Ontrack provides data recovery services for all types of media, including digital evidence which can later be used in court. In this video Robin England, Senior Research & Development... More

Inside OPD - Evidence Collection Unit

A look at how the Owensboro Police Department handles evidence and inspects for finger prints and blood. More

FTK 3.0 | How To | Tips and Tricks: Using Field Mode to Quickly Access Case Data


SANS DFIR Webcast - Incident Response Event Log Analysis

SANS Incident Response Training Course: Windows event logs contain a bewildering variety of messages. But homing... More

Stop Cell Phone Tracking, Spying, Stalking, Hacking and Eavesdropping with the Detracktor.

For more information click on this link. Spyware can be placed on a phone without someone having physical contact with the phone. See for details.... More

Digital Forensics: Hardware

This is one of my lectures that I have decided to make publicly available on YouTube. The lecture is a 15-minute overview of the types of hardware used by digital forensic evidence experts.... More

Exploring a Drive Image with Autopsy in Kali Linux

Using the Autopsy forensic browser inside Kali Linux to explore the contents of a drive image. More

Cyber Forensics Investigations, Tools and Techniques | SysTools Forensics Lab USA

SysTools Software is amongst the notable brands representing India with its active and aggressive contribution in the field of Digital Forensics and e-Discovery which reflects their involvement... More

How Facebook Can Be Used In An Online Investigation | i-Sight One of the most controversial sources to an investigator is Facebook. In the conclusion of this webinar on investigations online, Cynthia Hetherington... More

How To Get Someones IP Address (The Real Way)

Today I will be showing you how to get someones IP address on the internet using Facebook. And track that IP address to give you more information. This is aimed sort of towards cyber bullying... More

How to Find IMEI of Lost, Stolen Android or iPhone, Track Online

The IMEI number can be found on the phone by using the *#06# code on the dialer or the case of the phone. However, if you don't have access to any of those, this video will show you show... More


HOW TO GET BACK DELETED DATA FROM A USB SD HARDDRIVE OR PHONE MEMORY or any FLASH DRIVE,, Forword: I deleted all my files on my SD card thinking I was Formatting a USB stick i sticked... More

How to find lost mobile using imei number in india

Please watch: "How to find any girls whatsapp number || HINDI || लड़कियों के WHATSAPP नंबर एसे पता करे || हिन्दी ||" More

Police recover cache of fake documents used for getting bail

Ranchi police on Friday recovered a huge cache of fake documents from a motorbike used for getting bail for prisoners. More

Stalkers Using GPS Devices To Track Victims

Local police warn women to watch out for new GPS tracking devices that are easy to hide in cars and can be used to track them. More

E-Geniuses - Data Recovery: How to Recover Data Hard Drive Data Recovery Here are the 3 basic types of hard drive "crashes" and how to recover data in these scenarios.: 1) File structure is incorrect (usually... More

Record Other People Phone Calls Recording And Track Live Location - Free SPY Apps For Android

Better than Mrecorder is mSpy! Check this out. Record Other People Phone Calls Recording And Track Live Location Without let Them Know Free Spy Apps For Android:-... More

iPhone Forensics & Data Recovery - Get Deleted Text Messages More

Recover Deleted Text Messages & more with SIM Card Seizure

Recover deleted text messages, recent calls, contacts and more with SIM Card Seizure™ from SIM Card Seizure has been used by law enforcement and investigators throughout... More

Stolen Vehicle Recovery by Guardian Patch

Stolen Vehicle Recovery by Guardian Patch - Visit our site to find out more: The Guardian Patch is a revolutionary mobile technology that allows you to track... More

Find stolen phone by IMEI number

Phone Finder - find stolen or lost phone by IMEI or number More

You Have the Right to Remain Silent – California Bill Strengthens Miranda for Kids

Take Action: Currently in California, children—no matter how young— can waive their Miranda rights. When law enforcement conducts... More

Webwatcher Review - Full Walk-Through Tutorial - Watch this WebWatcher review to get more details on how it works and what it can monitor. I take you inside the software for a detailed WebWatcher review.... More

How to track a missing/stolen laptop (free)

Hello youtube its pspslimhacks Today im going to show you on how to track you laptop or other device that you register using prey. Its a free software. Prey: ... More

Tapping your cell phone

13 Investigates explains how your cell phone can be secretly hijacked and used against you - and how to protect yourself. ALSO SEE OUR STORY HERE: More

Can you recover deleted text messages from a cell phone?

Jesse Lindmar, Director of Computer Forensics for Sensei Enterprises, Inc., answers the frequently asked question, "Can you recover deleted text messages from a mobile phone?" Call us at (703)... More

How to Make an ATM Spew Out Money

Barnaby Jack, director of security testing at the computer security company IOActive, demonstrates how to hack an ATM to make it dispense money. More

iPhone Recovery Stick The Only Way To Get Deleted iPhone Data Do you need to know what's happening on an iPhone? Are... More

how to recover data from raw file using foremost

Foremost is a forensic data recovery program for Linux used to recover files using their headers, footers, and data structures through a process known as file carving.Although written for law... More

$2,000,000 Clean Room! - DriveSavers Data Recovery Tour

Thanks to DriveSavers for sponsoring this video! Learn more about them at DriveSavers Facebook: DriveSavers Twitter: More

forensic data recovery using Foremost || data carving tool || part 2

Foremost is a forensic data recovery program for Linux used to recover files using their headers, footers, and data structures through a process known as file carving.[3] Although written for... More

The Real Deal: Credit Card System at Recover

ALBANY - If you used a credit or debit card at one of the eight local Recovery Sports Grills in the Capital Region, you'll want to pay close attention to your statements. CBS6 has learned... More

how to trace location of ip address of computer , laptop , or mobile phone

In order to trace the current position of a ip address of any internet device such as computer , laptop . or mobile which acess internet , every device which connect to internet assign a unique... More

Computer Forensics: How to Image a PC using Magnet ACQUIRE 2.0

For more information, please visit With the release of Magnet ACQUIRE 2.0, we've added support for acquiring computer and USB devices. This will allow examiners... More

Destroy Hard Drive Data Beyond Recovery

Destroy Hard Drive Data Beyond Recovery If you have a old computer or a hard drive that you what to wipe the data from permanently, this video could be for you, today with all the data files... More

Geek Speak Cast 1- Webisode 2 - Police Software -- Geek Speak the newest video series about police and the technology they use in the performance of their everyday duties. In Webisode 2 we talk about software used... More

How Do You Capture or Recover Electronic Evidence on Computers and Cell Phones?

New technologies mean evidence of fraud may be electronic, hidden and difficult to detect. How do you capture or recover electronic evidence on computers and cell phones? Obviously, an investigat... More

Motorcycle Theft Compilation | Biker Chased By Thieves | Moped Thieves Spotted

In this compilation, moped thieves, motorcycle thieves, bikers chased by motorcycle thieves, motorcycle theft caught on CCTV, motorcycle theft in the london uk and else where around the world.... More

Stolen iPHONE Tracked Down And Recover By "Secret Veteran Force"

My friend got his iPHONE stolen and we track it and find it! Thief-0 Technology-1 My channel: I own all content used in this video Music created... More

Yelawolf - Johnny Cash

Get Yelawolf's "Love Story" - Sign up for updates: Music video by Yelawolf performing Johnny Cash. (C) 2015 Interscope... More


In no way did I willfully extract or data-mine these files from Snapchat. I simply browsed the files already on my phone. This video is not intended to harm Snapchat in any way. It simply... More

How to remove a Trojan, Virus, Worm, or other Malware for FREE by Britec

How to remove a Trojan, Virus, Worm, or other Malware Malware - Malware is programming or files that are developed for the purpose of doing harm. Thus, malware includes computer viruses,... More