home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page303.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  133KB  |  817x1045  |  8-bit (256 colors)
Labels: book | booth | box | bulletin board | comic book | crt screen | daily | desk | monitor | plaything | sky | tribute album | windowpane
OCR: OPERATING SYSTEMS AND FILE MANAGEMENT 2 3 5 Conventional crimes, such as car theft are often or cache files can also yield evidence pointing law solved by using standard investigative techniques enforcement officers to Web sites the suspect visited with information from computer databases. T0 solve that might be fronts for illegal activity. puter cybercrimes forensic however, investigators often are the required special skills of com- sic When investigators computer use is a three target of a techniques cyber attack, track foren- the source The first option is to make an immediate image of the server's hard disk and look through its log files for evidence of activity coming from unautho- rized IF addresses. A second technique c to monitor the intruder by watching login attempts, changes to ...