{"id":412,"date":"2016-07-30T12:36:22","date_gmt":"2016-07-30T12:36:22","guid":{"rendered":"https:\/\/www.acquireforensics.com\/blog\/?p=412"},"modified":"2016-07-30T12:36:22","modified_gmt":"2016-07-30T12:36:22","slug":"dbf-forensics","status":"publish","type":"post","link":"https:\/\/www.acquireforensics.com\/blog\/dbf-forensics.html","title":{"rendered":"DBF Forensics Useful &amp; Important for Examining The Data"},"content":{"rendered":"<h3>Exordium<\/h3>\n<p>DBF forensics plays most important role in forensic investigations. Investigators generally\u00a0trust on DBF file for finding any clue from source file. The DBF file is a database format file\u00a0which\u00a0contains the attribute information. It is produced by long lived database application <strong>dbase<\/strong>. DBF is a common file format for information . It can be opened in Microsoft Excel or MS Access. DBF files are mainly used to organize the\u00a0data.<br \/>\n<img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-414\" src=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2016\/07\/DBF-forensics-logo.png\" alt=\"DBF forensics\" width=\"192\" height=\"202\" \/><\/p>\n<h2>DBF Forensics Useful For Investigators<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-415 size-full\" src=\"https:\/\/www.acquireforensics.com\/blog\/wp-content\/uploads\/2016\/07\/Database-forensics.png\" alt=\"DBF Forensics\" width=\"543\" height=\"124\" \/><\/p>\n<p>Cyber crime investigators firstly search the directory to find an\u00a0evidence. NTFS file system creates a database of computer directory report in .dbf file. This file can be accessed\u00a0by Microsoft Excel, Open Office Calc and many other similar kind of applications. The MD5 hash value is used to determine an identical contents and to check\u00a0whether the contents have altered or not. When Cyber crime related cases are\u00a0found\u00a0then\u00a0investigator recovers the .dbf file first to find an\u00a0evidence.<\/p>\n<h2>Causes For Loss Of DBF Files<\/h2>\n<ul>\n<li>Virus intrusion<\/li>\n<li>File deletion through window DOS<\/li>\n<li>Deletion of DBF files<\/li>\n<\/ul>\n<p><strong>Yodot file recovery tool<\/strong> is user friendly and\u00a0very useful for forensic investigators. It\u00a0can easily examine &amp; restore deleted\/lost DBF files from machine or any storage devices.<\/p>\n<h3>Types Of Information Found In DBF Forensics<\/h3>\n<p>A DBF forensic is composition of header, Data records, deletion flag and end of file marker.<\/p>\n<ul>\n<li><strong>Heade<\/strong>r- It\u00a0contains information of file structure<\/li>\n<li><strong>Data records<\/strong>&#8211; It\u00a0contains the actual data<\/li>\n<li><strong>Deletion flag<\/strong>&#8211; One byte of each record is reserved for the deletion flag<\/li>\n<\/ul>\n<p>A DBF file\u00a0contains the data organized in\u00a0database according to fields and records. Each database field can contain one type of data, and each records can hold one data value for each field.<\/p>\n<h3>Conclusion<\/h3>\n<p>DBF file is most important file for examination. Basically, In some cyber crime investigation DBF file could be important evidence. In this article, I have described\u00a0important details like type of information in DBF files, causes for losing\u00a0DBF file and how to recover lost DFB file.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Exordium DBF forensics plays most important role in forensic investigations. Investigators generally\u00a0trust on DBF file for finding any clue from source file. The DBF file is a database format file\u00a0which\u00a0contains the attribute information. It is produced by long lived database application dbase. DBF is a common file format for information . It can be opened [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":445,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-412","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-file-format"],"_links":{"self":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts\/412","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/comments?post=412"}],"version-history":[{"count":1,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts\/412\/revisions"}],"predecessor-version":[{"id":439,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/posts\/412\/revisions\/439"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/media\/445"}],"wp:attachment":[{"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/media?parent=412"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/categories?post=412"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.acquireforensics.com\/blog\/wp-json\/wp\/v2\/tags?post=412"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}