±Partners and Sponsors
New Today: 2
New Yesterday: 5
±Follow Forensic Focus
· WhatsApp – discovering timestamps of deleted messages
· Man In The Middle Attack: Forensics
· Extracting Evidence from Destroyed Skype Logs and Cleared SQLite Databases
· Windows 8 File History Analysis
· Understanding Rootkits: Using Memory Dump Analysis for Rootkit Detection
· Bitcoin Forensics Part II: The Secret Web Strikes Back
· OS X Mavericks Metadata
· Bitcoin Forensics – A Journey into the Dark Web
· Analysis Of iOS Notes App
Page 414Back to top Back to main Skip to menu
The licensed private investigator, with more than two decades of experience in computer forensics, is the go-to guy when companies need to analyze and retrieve information stored on a computer in such a way that the information can be used as evidence in a court of law.
â€œThis,â€ he said, pointing to his cell phone, â€œis increasingly becoming a piece of digital evidence that has to be investigated.â€
Computer forensics research, which looks for evidence about crimes in electronic media, is a hot topic at Purdueâ€™s School of Technology.
From the comfort of your home or office anytime 24 hours/day, 7 days/week.
What do you need to know when making or receiving an Electronic Discovery request pertaining to e-mail? Where are you likely to find e-mail of value and how do you get it? Deleted e-mail does not mean it is gone, find out why.
Cost $95.00 (can be viewed by one or many at a time). For more
information call 732-544-8080 or e-mail firstname.lastname@example.org
More (The Exponent)