An investigator is conducting a forensic analysis on a suspect ' s Microsoft Outlook account. The investigator identifies that the suspect ' s emails are stored in both .pst (Personal Storage Table) and .ost (Offline Storage Table) files. Since the .ost file is primarily used for offline access to emails in IMAP, Exchange, or Outlook.com accounts, the investigator needs to decide on the appropriate method for acquiring and analyzing the data contained in those files. The investigator is particularly focused on analyzing the .ost file for email evidence. Which of the following steps should the investigator take to properly acquire the email data from the .ost file?
Henry, a forensic investigator, is analysing a system suspected of being compromised by a stealthy rootkit. The rootkit appears to be sophisticated, hiding its files and processes to avoid detection. Henry decides to conduct a memory and registry analysis to uncover the hidden rootkit. Which of the following tools would be the best choice for Henry’s task?