Quantcast
Channel: Forensic analysis – IT Answers
Browsing latest articles
Browse All 11 View Live

How can a general user trace the origin of TCP/IP data generated by...

New Discussion Post by Genderhayes

View Article


Computer Fraud and Invasion of Privacy

I have had someone to illegally go into one of my email accounts and delete specific files. I know that this is a felony crime. I am trying to figure out the process of attaching the IP addresses that...

View Article


Retrieving a deleted email in Lotus Notes

Question Edited by Michael Tidmarsh The post Retrieving a deleted email in Lotus Notes appeared first on IT Answers.

View Article

Change order of timestamps

I’m doing legal research on a case; If some files’s timestsmps were changed, could the files be put in chronological order with existing files on the harddrive? (so these new files would look older)...

View Article

Network forensics

New Discussion Post by Harisheldon The post Network forensics appeared first on IT Answers.

View Article


Multiple email address, 1 iPhone = multiple IP addresses?

New Answer by Michael Tidmarsh The post Multiple email address, 1 iPhone = multiple IP addresses? appeared first on IT Answers.

View Article
Browsing latest articles
Browse All 11 View Live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>