
143
Chapter 5
Software: Operating Systems,
Network Traffi c, and
Applications
Introduction
In Chapter 4, the authors examined the various hardware components that the cyber forensics
investigator might encounter. e information contained within this chapter is intended as a
reference and to provide an overview of the various software components that the cyber forensic
investigator should have familiarity with. ese software components are divided into three
distinct categories: operating systems, network traffi c, and applications.
Web sites included in this chapter are intended to provide current and accurate information;
however, it is impos ...