11
Networking Basics
Very rarely in your career will you have to investigate a single computer that has not connected to a network. When I say “computer,” this includes mobile devices. Desktops, laptops, and mobile devices are designed to share information through a network we refer to as the “Internet.” There are legitimate uses for such devices as well as illegitimate uses. For example, users of these devices have been known to record audio and video of themselves committing criminal acts. These same users will also use the Internet to research activities they plan on executing in the future; these activities will include criminal acts.
There may also come a time when you are called to investigate a crime where a device has been the target ...
Get Learn Computer Forensics - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.