Author Question: Discuss forensic investigation in non-Window operating systems. What will be an ideal ... (Read 63 times)

humphriesbr@me.com

  • Hero Member
  • *****
  • Posts: 550
Discuss forensic investigation in non-Window operating systems.
 
  What will be an ideal response?

Question 2

How common is it to become the victim of an Internet involved crime in the area of exploitation or stalking?
 
  What will be an ideal response?



kaylee05

  • Sr. Member
  • ****
  • Posts: 318
Answer to Question 1

 Macintosh operating system
 Imaging
 Finding evidence
 Forensic toolkits: Black Bag Technologies Mac Forensic Software and MacForensicsLab
 Linux/Unix Operating Systems
 Tools: Maresware: Linux Forensics, the Farmer's Boot CD, and SMART

Answer to Question 2

Results from Youth Internet Safety Survey
Results from Pew Research Center study on cyberbullying
Results from Finn study on stalking
Results from National Crime Victimization Supplemental Victimization Survey



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

Cucumber slices relieve headaches by tightening blood vessels, reducing blood flow to the area, and relieving pressure.

Did you know?

The immune system needs 9.5 hours of sleep in total darkness to recharge completely.

Did you know?

The longest a person has survived after a heart transplant is 24 years.

Did you know?

Illness; diuretics; laxative abuse; hot weather; exercise; sweating; caffeine; alcoholic beverages; starvation diets; inadequate carbohydrate consumption; and diets high in protein, salt, or fiber can cause people to become dehydrated.

Did you know?

More than 150,000 Americans killed by cardiovascular disease are younger than the age of 65 years.

For a complete list of videos, visit our video library