Fitbit, Fun, Forensics, and Foes by Steve Burgess, 2018 Have you tracked your 10,000 steps today? Has anyone else tracked them? Fitness trackers are...
Search Results
Data Recovery Myths and Misconceptions
In the very early 80's, IBM introduced the IBM PC, progenitor of most modern personal computers. That same year, undoubtedly, the first PC hard disk...
About
AboutBurgess Forensics is a leading provider of computer forensics, expert witness and data recovery services. Pioneers in the industry, providing...
How to Avoid Being Hacked, Part 2 – Two-Factor Authentication
Multi-factor authentication (MFA) makes it much harder for a hacker to get access to your online stuff, and the most common form of consumer MFA is...
Links
LinksBeginners Guid to Computer Forensics - Guidelines, definitions, other resources, and more about computer forensics. Private Investigators -...
Get a Quote
Get a QuoteFeel free to call us at (805) 349-7676, 866-345-3345 toll free or email us at info@burgessforensics.com, or fill out the following form:...
Computer Forensics – Criminal vs Civil: What’s the Difference?
In the field of computer forensics, as in the field of law, procedures in civil cases differ somewhat from those in criminal cases. The collection...
CSI Computer Forensics – Real Cases From Burgess Forensics #12 – The Case of the Computer That Got Lost
The stories are true; the names and places have been changed to protect the potentially guilty. A few years ago, Debby Johnson, an attorney from a...
Keyword Searches
Computer Forensics Expert Steve Burgess explains keyword searches - what they are, how to design an effective search, and differences between...
Who We’re Not a Fit For
Who We’re Not a Fit ForPaper document authentication: We’re happy to comment on the authenticity of some documents, such as printed emails or Word...