Foxton Forensics logo
  • Products
    • Browser History Examiner
    • PageRecon
  • Free Tools
    • Browser History Capturer
    • Browser History Viewer
    • SQLite Examiner
  • Support
    • Customer Portal
    • FAQs
    • Renew Subscription
    • Submit Ticket
  • Resources
    • Blog
    • Downloads
    • Free Tools
    • News
  • Company
    • Contact Us
    • Our Clients
    • About us

Blog

Investigating web history in the new Edge Chromium browser

27 Jan 2020

Edge has joined a long list of web browsers based on the open-source Chromium browser, most notably Chrome. This means Edge now stores browsing history in an almost identical format to Chrome. Browser History Examiner and our free tools have been updated to support the new Chromium-based Edge browser.

Read More

Comparing SQLite schemas across multiple databases

17 Dec 2019

SQLite Examiner has been updated to include a Schema Export feature which exports the schema of a SQLite database to a JSON file. This enables examiners and developers alike to more easily track the changes to important artefacts and verify their scripts and tools remain accurate.

Read More

Cyber Challenge Walkthrough - Nov 2019

03 Dec 2019

Last month we launched our first cyber puzzle challenge with a handful of prizes to be won for those Forensic Foxes that helped us track down our escaped Rabbit. We were delighted to have over 500 people take up the challenge but when all was said and done and the dust settled, 4 brave soles proved wily and persistent enough to complete our challenge and catch the Rabbit 🐰.

Read More

Following the trail of Skype, Electron and Chromium using Browser History Examiner

22 Oct 2019

The Skype desktop app is now built using the Electron framework, which in turn uses the Chromium rendering engine and therefore creates some of the same artifacts as Google Chrome. We discuss how lots of useful data can be obtained from an Electron/Chromium based desktop application such as Skype using Browser History Examiner.

Read More

Using browser history to detect a potential malware infection

15 Oct 2019

Browser History Examiner (BHE) has the capability to detect if a user has visited any known malicious URLs - that is specific web pages that are known to be currently (or have in the past) serving malware to their visitors. In combination with the remote capture feature within BHE, investigators and administrators alike can quickly and easily target and review web browser history for potential risk of a malware infection.

Read More
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6

Recent Posts


  • Analysing Safari browser history
  • Analysing browser site settings
  • Examining internet history in forensic images

Categories


  • Browser cache (4)
  • Cyber Challenges (2)
  • Data Capture (5)
  • Data Extraction (8)
  • Exports (1)
  • Filtering (3)
  • Form History (3)
  • JSON (5)
  • Passwords (2)
  • Releases (3)
  • Searches (2)
  • Skype (1)
  • SQLite (3)
  • Sync (1)
Loading...
Foxton Forensics logo

Foxton Forensics specialise in digital forensics software with a focus on internet history analysis. Our products are trusted by thousands of customers worldwide.

Follow Us


  • Twitter
  • LinkedIn
  • Blog
  • Newsletter

Support


  • Customer Portal
  • FAQs
  • Submit Ticket

Company


  • Contact Us
  • About Us
  • Terms of Service
  • Privacy Policy

Copyright © Foxton Software Ltd, registered in England and Wales No. 07742722