Home » Computers

Understanding Computer Forensics Reports - A Loud Whisper!

Aug 16, 2008
I can hear it now! You are letting the cat out of the bag. By explaining computer forensic reports, you are aiding and helping computer criminals to cover their tracks.

But, there is always another side to an argument. By releasing this information, it can help people help computer forensic experts catch the criminals. Besides, people who commit computer crimes are very good at what they do. I am not releasing anything here they may not already know.

With that out of the way, let's dive in.

What makes up computer forensics reports? Where does the information come from? Who puts them together?

Let's start with the Who.

Computer forensics reports are prepared by computer forensics investigators. They gather the necessary information, analyze them and then draft out the final computer forensics reports. As good as they are, computer criminals oftentimes leave behind clues which aid the investigators to track down the root cause of their crime.

Even when the files have been deleted from the specific location in the computer, the original data is not at all erased from the entire computer system. With certain techniques, tools, and skills that the investigators are equipped with, the analysis of the fraudulent act or crime can be made with such accuracy.

Where does the computer forensic report information come from?

There are four main areas where the investigators gather their evidence from. There are other areas which are looked into but the following are the most commonly looked areas.

1. The Saved Files:

These are easy. If you saved it, it's in the computer. All the investigator needs to do is open them up to examine them. They don't need anything special to view or examine them.

2. The Deleted Files:

When data is deleted, it is put in the trash bin. The computer forensic expert will look in the bin to see what is in it.

The tougher part is the deleted files that have also been deleted from the trash bin. These will require special software in order to restore them.

3. The Temporary Files:

These data are produced when one browses through the Internet, works on any document, and uses some other types of backup software and other installations and applications.

You can open some temporary files on the computer they reside on without any special software or tool. Others will require the use of special tool or software.

4. The Meta Data:

The Meta data gives you the details of a document or file. Among the details which appear include the date that such files had been created, modified, and the last time when it was accessed. You can even get information about the creator of the file.

What makes up computer forensics reports?

Computer forensic reports will be made of information from the above four sources. It will also include information gathered from e-mails, file transfers, web browsing, online accounts, charts, and internet searches. Unknown to some people is that their web searches can be retraced.

There you have it......the secret, but not so secret computer forensic reports. It is by no means comprehensive, but you get the idea.

Note: You are free to reprint or republish this article. The only condition is that the Resource Box should be included and the links are live links.
About the Author
Copywrite Kenneth Echie. Kenneth writes for Criminal Justice Schools and Degrees . Get free scholarship and grant report and learn about Computer Forensics by visiting. Affiliated website: http://www.extra-income-ideas.com
Please Rate:
(Average: Not rated)
Views: 158
Print Email Share
Article Categories
    • Artists
    • Gambling
    • Humanities
    • Humor
    • Movies
    • Music
    • Photography
    • Tattoos
    • Television
    • Classic Cars
    • Motorcycles
    • Recreational Vehicles
    • SUVs
    • Trucks
    • Vans
    • Branding
    • Business Opportunities
    • Careers and Jobs
    • Corporate
    • Customer Service
    • Direct Mail
    • Entrepreneurship
    • Ethics
    • Financing
    • Franchising
    • Home-Based Business
    • Human Resources
    • Import and Export
    • Leadership
    • Management
    • Market Research
    • Marketing and Advertising
    • Negotiation
    • Network Marketing
    • Networking
    • Organizational
    • Presentation
    • Project Management
    • Public Relations
    • Small Business
    • Strategic Planning
    • Team Building
    • Telemarketing
    • Training
    • Ask an Expert
    • College and University
    • Home Schooling
    • K-12
    • Languages
    • Online Education
    • Psychology
    • Accounting
    • Credit
    • Currency Trading
    • Debt Consolidation
    • Insurance
    • Investing
    • Leasing
    • Loans
    • Mortgage
    • Mutual Funds
    • Personal Finance
    • Stock Market
    • Structured Settlements
    • Taxes
    • Wealth Building
    • Coffee
    • Cooking
    • Gourmet
    • Recipes
    • Wine and Spirits
    • Acne
    • Aerobics
    • Alternative Medicine
    • Beauty
    • Cancer
    • Cosmetics
    • Depression
    • Diabetes
    • Diseases and Conditions
    • Fitness Equipment
    • Fitness
    • Hair Loss
    • Heart Disease
    • Medicine
    • Men's Health
    • Muscle Building
    • Nutrition
    • Skin Care
    • Supplements and Vitamins
    • Weight Loss
    • Women's Health
    • Yoga
    • Arts and Crafts
    • Babies
    • Collecting
    • Elderly Care
    • Genealogy
    • Hobbies
    • Parenting
    • Pets
    • Pregnancy
    • Woodworking
    • Feng Shui
    • Gardening
    • Home Appliances
    • Home Security
    • Interior Design
    • Landscaping
    • Affiliate Programs
    • Article Marketing
    • Auctions
    • Audio
    • Banner Advertising
    • Blogging
    • Broadband
    • Domain Names
    • E-Books
    • E-Commerce
    • Email Marketing
    • Ezines and Newsletters
    • Forums
    • Internet Marketing
    • Link Popularity
    • Pay-Per-Click
    • Podcasting
    • RSS
    • Search Engine Marketing
    • Search Engine Optimization
    • Security
    • Social Media
    • Spam
    • Video
    • Viral Marketing
    • Web Design
    • Web Development
    • Web Hosting
    • Copyright
    • Cyber Law
    • Intellectual Property
    • National, State, Local
    • Patents
    • Regulatory Compliance
    • Trademarks
    • Buying
    • Selling
    • Baseball
    • Basketball
    • Boating
    • Cycling
    • Extreme Sports
    • Fishing
    • Football
    • Golf
    • Hockey
    • Hunting
    • Martial Arts
    • Running
    • Scuba Diving
    • Soccer
    • Swimming
    • Tennis
    • Dating
    • Divorce
    • Marriage
    • Weddings
    • Astrology
    • Buddhism
    • Christianity
    • Faith
    • Hinduism
    • Islam
    • Judaism
    • Meditation
    • Metaphysical
    • New Age
    • Cable and Satellite TV
    • Cell Phones
    • Communication
    • Gadgets and Gizmos
    • GPS
    • Satellite Radio
    • Video Conferencing
    • VoIP
    • Addictions
    • Coaching
    • Goal Setting
    • Motivational
    • Stress Management
    • Time Management
    • Clothing
    • Electronics
    • Fashion
    • Gifts
    • Jewelry
    • Causes and Organizations
    • Environment
    • History
    • Holidays
    • Men's Issues
    • Nature
    • Philosophy
    • Politics
    • Women's Issues
    • World Affairs
    • Air Travel
    • Camping
    • Cruises
    • Destinations
    • Outdoors
    • Article Writing
    • Book Reviews
    • Copywriting
    • Fiction
    • Non-Fiction
    • Poetry
    • Quotes
    • Screenplay
    • Tools and Resources