Saturday, August 25, 2012

Digital Evidence, Key opened Cyber Crime??

Cyber crime is a glimpse of the invisible and extremely difficult to trace, but in reality it is difficult also to close-deadpans, which will smell like carrion smell too.

Evidence of the cyber crime committed may be removed from the device and the data network is used. But if you dig deeper, may still be left behind the remains of the crime all the way cyberspace.

For it is better if you know how the process of formation of a digital evidence, digital evidence where it can be formed and stored, and many more tricks collecting digital proofs.

Although only an outline and will not make you become a forensic expert, but this information is useful for reference when a Cyber crime happens to you and your digital devices.
What is the first digital proof cyber crime that you will encounter on the PC?
To explore the digital evidence on a PC, it might be worthwhile to review briefly how the process and the workings of a computer in the service users.

And how a computer device can form a strong enough digital evidence from cyber crime. Every time a computer is enabled, then a process called booting will occur the first time.

There are three stages of the process in the boot process, the CPU reset, Power-On-Self-Test (POST), and the boot disk

Top Ro Ro Ro

0 comments:

Post a Comment