Running head: FORENSIC CASES
Computer Forensic and Investigation
Prof: Bhanu Kapoor
November 26, 2013
People are the most difficult creatures on earth to understand. Some have the mind set of doing some the off the wall and unacceptable things using technology. In this paper I have discussed location and the type of data you will find in in the case of a financial fraud and a child pornography case. Later in the paper discusses the procedures that and investigator might take to collect data from a suspect system. I will also provide a simple tool that can be used to collect all ...view middle of the document...
Log files can provide the investigator with information such as the last person who logs on to a system the date /time and what they were doing. There is several other places that can provide investigators with evidence such as: Quicken files database, calendars, address books, notes, and spread sheets.
Thanks to tools like Paraben P2 commander investigators can easily collect all the data they need to a criminal away. Paraben P2 commander is a certified, top of the line software that’s acceptable by many courts today. P2 can provide investigators with everything they need. P2 Commander was built on Paraben's trusted email examination tools for unparalleled network email and personal email archive analysis. Advanced features like Data Triage analysis, pornography detection, and file...