-
September 22nd, 2004, 05:02 PM
#1
Junior Member
Computer Forensics Procedure
Hello...i'm new here
I want to study computer forensic at degree level next falls, but before I apply for courses, I want to get as much knoweldge as possible. So one of my question is that what is the normal procedure usually taken when a computer is ceased from criminals, paedophiles, terrorists, Fat Tony, etcetra ?
I guess they a make a mirror image of it, and leave the original intact, what next? what kind of analysis is undertakene etc If you can show my in the right directions, that will be splendid....
Posting Permissions
- You may not post new threads
- You may not post replies
- You may not post attachments
- You may not edit your posts
-
Forum Rules
|
|