Menu

Categories for Computer Forensic & Cyber Applications

Internet Traces

October 29, 2016

Accessing the Internet leaves a wide variety of information on a computer including Web sites, contents viewed, and newsgroups accessed.... View Article

Registry

October 29, 2016

Windows systems use the Registry to store system configuration and usage details in what are called “keys.” Registry files on... View Article

Log Files

October 29, 2016

Attribution is a major goal and log files can record which account was used to access a system at a... View Article

Data Recovery

October 29, 2016

There are two main forms of data recovery in FAT and NTFS file systems: recovering deleted data from unallocated space... View Article

File Systems

October 29, 2016

  The simplest Windows file systems to understand are the FAT (file allocation table) file systems: FAT12, FAT16, and FAT32.... View Article

File Formats and Carving

October 28, 2016

Many kinds of files have a distinctive structure that was designed by software developers or standards bodies, and that can... View Article

Cyberstalking

October 28, 2016

Cyberstalking is the use of the Internet or other electronic means to stalk or harass an individual, a group of... View Article