Data Recovery Myths and Misconceptions

In the very early 80’s, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk failed and someone was screaming about their data and cursing IBM. Shortly after that, we started the data...

Can You Browse the Internet in Secrecy?

By Jessica Riccio Under normal circumstances, browsing the Internet leaves many footprints (“artifacts”) across the user’s computer. A computer forensic experts’ ability to find Internet History artifacts will frequently have a significant impact on the outcome of a...

Cyberbullying Law and Intervention

Defining Cyberbullying Many people (the author included) conflate cyberbullying and cyberstalking. Both are forms of cyberharassment, but the National Conference of State Legislatures limits the term “bullying,” or “cyberbullying” to electronic...

Federal Rules of Civil Procedure and ESI

The evolution of e-discovery and computer forensics, Part 3: The 2006 ESI Amendments to the FRCP The field of electronic discovery and digital forensics is rapidly evolving. In the early years of this millennium, discovery rules dealt primarily with paper, but with...

Pin It on Pinterest