F-Response Blog
You never forget your first time. Using F-Response before it was F-Response
09.07.2024
This year has been quite a trip down memory lane. I've had an opportunity to explore some of the ancient hardware I'd worked so hard to get F-Response on, and reminisce about what it was like to disrupt the world of remote forensics in the early 2000s.
What I haven't talked about was the …
Read the full postRegRipper and F-Response
13.06.2024
This one is personal to me. I've known Harlan Carvey, creator of RegRipper, a long time. We met over a decade ago when he so graciously picked me up at the airport and introduced me to a friend of his getting ready to do big things in the physical memory space (cough Read the full post
Do you EDR?
20.05.2024
Since 2020, EDR (Endpoint Detection and Response) tools and platforms have become all the rage. Endpoint detection and response, also known as endpoint threat detection and response (ETDR), is a cybersecurity technology that continually monitors an "endpoint" (e.g. mobile phone, laptop, …
Read the full postAn Interview with Jason Hale of USB Detective
06.05.2014
A few days ago we profiled USB Detective, a fascinating desktop application for USB device artifact forensics.

Since that time, we reached to Jason Hale of USB Detective to get a …
Read the full postF-Response and USB Detective
29.04.2024
It should come as no surprise that we love finding new and interesting analysis tools. Finding investigative software that works well over F-Response is a passion of ours.
Recently, a customer reached out and asked us if USB Detective worked over an …
Read the full post