Author Question: Discuss forensic investigation in non-Window operating systems. What will be an ideal ... (Read 72 times)

humphriesbr@me.com

  • Hero Member
  • *****
  • Posts: 550
Discuss forensic investigation in non-Window operating systems.
 
  What will be an ideal response?

Question 2

How common is it to become the victim of an Internet involved crime in the area of exploitation or stalking?
 
  What will be an ideal response?



kaylee05

  • Sr. Member
  • ****
  • Posts: 318
Answer to Question 1

 Macintosh operating system
 Imaging
 Finding evidence
 Forensic toolkits: Black Bag Technologies Mac Forensic Software and MacForensicsLab
 Linux/Unix Operating Systems
 Tools: Maresware: Linux Forensics, the Farmer's Boot CD, and SMART

Answer to Question 2

Results from Youth Internet Safety Survey
Results from Pew Research Center study on cyberbullying
Results from Finn study on stalking
Results from National Crime Victimization Supplemental Victimization Survey



Related Topics

Need homework help now?

Ask unlimited questions for free

Ask a Question
 

Did you know?

When blood is exposed to air, it clots. Heparin allows the blood to come in direct contact with air without clotting.

Did you know?

Egg cells are about the size of a grain of sand. They are formed inside of a female's ovaries before she is even born.

Did you know?

Pubic lice (crabs) are usually spread through sexual contact. You cannot catch them by using a public toilet.

Did you know?

Today, nearly 8 out of 10 pregnant women living with HIV (about 1.1 million), receive antiretrovirals.

Did you know?

The Centers for Disease Control and Prevention (CDC) was originally known as the Communicable Disease Center, which was formed to fight malaria. It was originally headquartered in Atlanta, Georgia, since the Southern states faced the worst threat from malaria.

For a complete list of videos, visit our video library