by Steve Burgess | Sep 28, 2015 | Uncategorized
By Jessica Riccio In part one, we defined private browsing and discussed its history. We covered places where various browsers store browsing history and the technical means through which each browser does so. In this part, we give the steps and results of my own...
by Steve Burgess | Sep 21, 2015 | Uncategorized
“Is the U.S. ready for cyber war?” leads an article in FCW Online. FCW, “the Business of Federal Technology” is an online magazine designed to provide Federal tech execs with the guidance and information it needs to do business with the Feds. As such, it is...
by Steve Burgess | Sep 14, 2015 | Uncategorized
The stories are true; the names and places have been changed to protect the potentially guilty. A few years ago, Debby Johnson, an attorney from a large firm based in Kansas City, contacted me about a relatively simple matter. I was to travel to offices in Sacramento...
by Steve Burgess | Sep 14, 2015 | Uncategorized
We get this question several times a week, so it’s not just you. And no, it doesn’t mean you’re crazy – even if your friends think so, and even if law enforcement won’t take your case. People’s computers and phones get hacked, every day. Why...
by Steve Burgess | Sep 7, 2015 | Uncategorized
There are normal things that happen to hard drives and individual, occasionally unusual things that clients have managed to do over the three decades we’ve been recovering data for them. The usual suspects: Dust, fur, heat, electrical spikes, bumps, loose...