Author Question: Discuss forensic investigation in non-Window operating systems. What will be an ideal ... (Read 64 times)

humphriesbr@me.com

  • Hero Member
  • *****
  • Posts: 550
Discuss forensic investigation in non-Window operating systems.
 
  What will be an ideal response?

Question 2

How common is it to become the victim of an Internet involved crime in the area of exploitation or stalking?
 
  What will be an ideal response?



kaylee05

  • Sr. Member
  • ****
  • Posts: 318
Answer to Question 1

 Macintosh operating system
 Imaging
 Finding evidence
 Forensic toolkits: Black Bag Technologies Mac Forensic Software and MacForensicsLab
 Linux/Unix Operating Systems
 Tools: Maresware: Linux Forensics, the Farmer's Boot CD, and SMART

Answer to Question 2

Results from Youth Internet Safety Survey
Results from Pew Research Center study on cyberbullying
Results from Finn study on stalking
Results from National Crime Victimization Supplemental Victimization Survey



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

There are more bacteria in your mouth than there are people in the world.

Did you know?

Persons who overdose with cardiac glycosides have a better chance of overall survival if they can survive the first 24 hours after the overdose.

Did you know?

The word drug comes from the Dutch word droog (meaning "dry"). For centuries, most drugs came from dried plants, hence the name.

Did you know?

Human neurons are so small that they require a microscope in order to be seen. However, some neurons can be up to 3 feet long, such as those that extend from the spinal cord to the toes.

Did you know?

Symptoms of kidney problems include a loss of appetite, back pain (which may be sudden and intense), chills, abdominal pain, fluid retention, nausea, the urge to urinate, vomiting, and fever.

For a complete list of videos, visit our video library