by Steve Burgess | Aug 31, 2015 | Uncategorized
The stories are true; the names and places have been changed to protect the potentially guilty. It was a cold and rainy San Francisco afternoon. I sat sweating in the conference room of a gritty skyscraper downtown. The deposing lawyer across from me was standing up,...
by Steve Burgess | Aug 24, 2015 | Uncategorized
Both computer forensics experts and data recovery technicians seek to recover deleted data. Data recovery is primarily interested in bringing back files, while computer forensics tends to dig deeper, looking not just for deleted documents, but also for metadata (data...
by Steve Burgess | Aug 20, 2015 | Uncategorized
The stories are true; the names and places have been changed to protect the potentially guilty. It was a grey October day, the kind of day when a guy likes to cozy up next to a bank of servers to keep warm, when the Teacher first called me. “They think I’m...
by Steve Burgess | Aug 17, 2015 | Uncategorized
By Steve Burgess Unified communications is the term used for integrating all communications – data and voice – over the Internet. This can include data in its myriad forms such as email, instant messaging data, data generated by business computer...
by Steve Burgess | Aug 10, 2015 | Uncategorized
By Steve Burgess A student asked me an interesting question today, regarding what I foresee in the field of computer forensics in the coming years: 5, 10, & 50. Having not thought about it before , my answers surprised me a bit. Mr. Burgess, I would like to thank...
by Steve Burgess | Aug 3, 2015 | Uncategorized
In the field of computer forensics, as in the field of law, procedures in civil cases differ somewhat from those in criminal cases. The collection of data and presentation of evidence may be held to different standards, the process of data collection and imaging can...