Author Question: Discuss forensic investigation in non-Window operating systems. What will be an ideal ... (Read 59 times)

humphriesbr@me.com

  • Hero Member
  • *****
  • Posts: 550
Discuss forensic investigation in non-Window operating systems.
 
  What will be an ideal response?

Question 2

How common is it to become the victim of an Internet involved crime in the area of exploitation or stalking?
 
  What will be an ideal response?



kaylee05

  • Sr. Member
  • ****
  • Posts: 318
Answer to Question 1

 Macintosh operating system
 Imaging
 Finding evidence
 Forensic toolkits: Black Bag Technologies Mac Forensic Software and MacForensicsLab
 Linux/Unix Operating Systems
 Tools: Maresware: Linux Forensics, the Farmer's Boot CD, and SMART

Answer to Question 2

Results from Youth Internet Safety Survey
Results from Pew Research Center study on cyberbullying
Results from Finn study on stalking
Results from National Crime Victimization Supplemental Victimization Survey



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

In ancient Rome, many of the richer people in the population had lead-induced gout. The reason for this is unclear. Lead poisoning has also been linked to madness.

Did you know?

The ratio of hydrogen atoms to oxygen in water (H2O) is 2:1.

Did you know?

There are 20 feet of blood vessels in each square inch of human skin.

Did you know?

Children of people with alcoholism are more inclined to drink alcohol or use hard drugs. In fact, they are 400 times more likely to use hard drugs than those who do not have a family history of alcohol addiction.

Did you know?

Acetaminophen (Tylenol) in overdose can seriously damage the liver. It should never be taken by people who use alcohol heavily; it can result in severe liver damage and even a condition requiring a liver transplant.

For a complete list of videos, visit our video library