Lawyer Services
Home
Domestic Investigations
Corporate
Corporate
Lawyer Services
Computer Forensics & Services

Computer Services

We provide expert, court approved, technological investigations, litigation and Information and Technologies (IT) Consultation. We provide our clients with a timely and professional service, while ensuring that our analysis will exceeds our client’s expectations. We are experienced in courtroom preparation and testimony. We provide comprehensive reports that are invaluable in legal proceedings.  We have extensive experience with firewalls, routers and global TCP/IP, based networks. We are experts in all operating systems, all versions of Windows, Apple, UNIX and Linux.

The Computer Forensic Anatamoy

Document and File Discovery

- Data remanence are the residual representation of data that has been in some way nominally erased or removed. This residue may be due to data being left intact by a nominal delete operation, or through physical properties of the storage medium. Data remnants may make inadvertent disclosure of sensitive information possible, should the storage media be released into an uncontrolled environment.

- Data recovery is the process of salvaging data from damaged, failed, corrupted, or inaccessible secondary storage media when it cannot be accessed normally. Data recovery can also be the process of retrieving and securing deleted information from a storage media for forensic purposes or spying. Analysis- Our computer forensic experts work side by side with your staff and may access data storage devices using recovery and analysis tools and techniques in an attempt to recover active and deleted data from inaccessible media and deleted files, including email.

- A hidden directory or hidden file on a computer is a directory (folder) or file which is not shown to the user by default. Hidden directories are most often used to hide important operating system-related files and user preferences. Unfortunately, this functionality can also be used by malicious programs or clever people to hide their presence or information from unaware users.

- Password Protected Files We use state of the art computers, software and techniques to access password protected files, hard drives and encrypted media.

- Safeguarding of Evidence/Infomration We follow a strict carefully developed set of procedures that address security, authenticity and chain-of-custody of the original media.  You can entrust us with your electronic media safe in the knowledge that we will use the highest standards and methodologies to protect and preserve the original media.

Monitor your Networks and Computers

- Analysis of User Activity We will provide reports on all user activity including, but not limited to, electronic mail, Internet and Intranet files accessed, files created and deleted, and user access times.  We can also provide analysis of corporate server and gateway logs.

* Links
FBI
http://www.fbi.gov/publications/pguide/pguidee.htm

Family Education
http://life.familyeducation.com/teen/internet-safety/57657.html?page=3

Designed & Hosted By: SavIsa Solutions