By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer...
Search Results
Computer Hoaxes for the Beginner
Can you say, "hoax?" With the advent of email, one person can send millions of messages. With the help of willing accomplice friends, a single hoax...
Viruses
What are computer viruses, Trojans and zombies? Sounds like a horror movie, doesn't it? Computer viruses are bits of computer code (1's and 0's)...
Cybersecurity & Covid-19: Vulnerability and What to Do About It
Cybersecurity & Covid-19: Vulnerability and What to Do About It Steve Burgess, 2020 As if we didn’t have enough to worry about. With so many of...
Curriculum Vitae
Curriculum Vitae Expert in most computer hardware, peripherals and operating systems and many applications. Specialist in digital, mobile, &...
Email spoofing, scamming, and hacking
Email spoofing, scamming, and hacking, Copyright 2024 by Steve Burgess Email domain spoofing scams With fortunes, privacy, and identity fraud at...
How to Avoid Being Hacked, Part 1 – Email
How to Avoid Being Hacked, Part 1 - Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically...
Audio File Challenges for Computer Forensics & eDiscovery
By Steve Burgess Unified communications is the term used for integrating all communications - data and voice - over the Internet. This can include...
Computer Forensics Glossary
Computer Forensics GlossaryNote: The terms in this glossary may have other uses in other fields. The uses discussed here are for general use in...
Printers and Copiers Left Out the FBI’s Search of Trump’s Mar-A-Lago
Printers and Copiers Left Out of the FBI’s Search of Trump’s Mar-A-Lago copyright, 2022, Steve Burgess We’ve only recently learned the content of...