by Steve Burgess | Aug 1, 2017 | Uncategorized
How to Avoid Being Hacked, Part 1 – Email Hacking is a common occurrence these days, but it’s good to know that hacking targeting you specifically because of who you are is far less common than scattershot hacking. Additionally, taking advantage of your online...
by Steve Burgess | Feb 22, 2016 | Uncategorized
In the very early 80’s, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data...
by Steve Burgess | Feb 15, 2016 | Uncategorized
By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...
by Steve Burgess | Feb 5, 2016 | Uncategorized
What is Cyberstalking? The first five entries in a Google search show five different definitions, but all agree that it has to do with the use of electronic communication to bother someone. That electronic communication could be through the use of social networks,...
by Steve Burgess | Feb 1, 2016 | Uncategorized
Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term “bullying,” or “cyberbullying” to electronic...