ACS can search for evidence throughout the data, examining both intact files and the remains of files. Using specialized software and working with a forensic copy of the source data, ACS can view any scrap of data that exists. We also pay attention to patterns of use. Sources of information range from the most familiar file types and formats to those that the majority of users have never encountered. For example, information can be found and viewed in well-known locations such as: • Directory listings and log files Often, more interesting information is located in areas not visible to most users and not easily accessible. These include: • Registry files Other information includes artifacts created automatically and often deleted automatically by the system. Frequently, users aren't aware of this data, which includes: • Temporary Internet files |
|
![]() |