tag:blogger.com,1999:blog-1466903740262764947.post7276902375475052618..comments2023-12-28T03:01:49.774-06:00Comments on Hacking Exposed Computer Forensics Blog: What Are You Missing?David Cowenhttp://www.blogger.com/profile/17629115910611763170noreply@blogger.comBlogger3125tag:blogger.com,1999:blog-1466903740262764947.post-65700809794205861582011-01-17T23:48:54.568-06:002011-01-17T23:48:54.568-06:00Thanks John!Thanks John!David Cowenhttps://www.blogger.com/profile/17629115910611763170noreply@blogger.comtag:blogger.com,1999:blog-1466903740262764947.post-65107181759189423942011-01-17T21:50:35.268-06:002011-01-17T21:50:35.268-06:00But since you asked for software I suppose I'l...But since you asked for software I suppose I'll mention CacheBack and ChromeAnalysis.John Jacksonhttp://hackingexposedcomputerforensicsblog.blogspot.comnoreply@blogger.comtag:blogger.com,1999:blog-1466903740262764947.post-80722341141394831912011-01-17T21:36:54.904-06:002011-01-17T21:36:54.904-06:00the file is "history" and the query is
S...the file is "history" and the query is<br />SELECT datetime(last_visit_time/1000000-11644473600,'unixepoch','localtime'),url <br />FROM urls<br />ORDER BY last_visit_timeJohn Jacksonhttp://hackingexposedcomputerforensicsblog.blogspot.comnoreply@blogger.com