Computer forensics investigations

Computer forensics with Inc.

Ever accidently delete a file on your computer only to try in vain to recover it.   Usually, a simple search in the recycle bin will allow you to recover the file.  However, if you permanently deleted the file (such as using the command Ctrl+Shift+Delete) then you won’t have much luck using the recycle bin.  There are available software that the home user can install that will provide a chance to recover the file but what if you don’t feel comfortable using such software or worse, the software did not yield the results you were hoping for?  This is where the professionals come in. has been in the game for years and employs its own forensics lab for both cellular and computer forensics investigations.  The main [...]

Get to the Truth with Digital Forensics

You’ve probably heard by now that you can’t believe everything you see and hear on the Internet, right? But what happens when there is an image that is undeniably you or taken in your business or agency location that is being circulated? Case in point: A central Florida police department was the subject of a pornographic image that was being distributed via Twitter. Of course the police department released statements that it was a fake image, it created a PR problem. Through computer forensics it was determined that the image had been created using computer imaging software. What if it happens to YOU? Organizations can often get past the situation. Not as easy for individuals. When this sort of thing happens to private citizens, it [...]

Forensic Computer Analysis Can Uncover What’s Lurking Inside

Carrying cards instead of cash, well, it used to make us feel a bit safer. But no longer. Credit card theft has been a long-time problem, but now the thieves are using a new avenue and it puts businesses as well as consumers at risk. Several employees at the county courthouse in the northern Texas town of McKinney discovered that their credit card information had been compromised after they had had lunch at a local restaurant. The thief wasn’t an unscrupulous employee or patron who made purchases using their credit card information, it was a hacker. That’s right, a hacker got into the restaurant’s computer system and lifted the customer’s information. This is just part of an alarming trend in hackers infiltrating small business systems. [...]

Go to Top