1
  • How can a general user trace the origin of TCP/IP data generated by persistent e-mail anomaly?

    Thank you very much for taking time to consider this question. What do you recommend for a general user who needs to trace the origin and route of TCP/IP data associated with an e-mail message? My SOHO computer is infected by some form of malware. The ISP's tech support could not resolve it; the...

    Troubleshoot201415 pointsBadges:
  • Change order of timestamps

    I'm doing legal research on a case; If some files's timestsmps were changed, could the files be put in chronological order with existing files on the harddrive? (so these new files would look older)

    Greenpolarbear5 pointsBadges:
  • Network forensics

    I am currently a final year student studying forensic computing. i was hoping someone could give me some information regarding network forensics, i would like to know if there is a need for development in this area, what is the current views on networking with regards to gathering of forensic data...

    SajMugh5 pointsBadges:
  • Retrieving a deleted email in Lotus Notes

    We are looking for a 2006 incoming email in one of our users mailbox. Since we can't seem to locate the email, we can't figure if the email was deleted. Is there a tool or company (e.g. forensics) which can retrieve such email or advise that the email was deleted?

    010410 pointsBadges:
  • Multiple email address, 1 iphone = multiple ip addresses?

    If a person creates both yahoo and gmail email accounts and sends messages from an iphone, will the ip addresses match? I'm sure they are from the same person! Moderator Note: This is a revised repost. --------------------------------------------------------------------------- Strings...

    BrentSheets6,925 pointsBadges:
  • Computer Fraud and Invasion of Privacy

    I have had someone to illegally go into one of my email accounts and delete specific files. I know that this is a felony crime. I am trying to figure out the process of attaching the IP addresses that I have to the person I suspect has committed this crime.

    Tripmom5 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following