Obtaining location information that is stored on systems, including ways of locating systems based on their Internet protocol addresses.
INFORMATION INCLUDED IN THIS CHAPTER:
• Location Information
• Document Artifacts
• Shortcuts and links
Tracking information can give a lot away about users and they may not even realize that it is happening. There are a number of ways that users can be tracked, whether it is their activities on the system or their locations, when they are attached to networks. Applications also leave artifacts that can be tracked long after the document that was created by the application has left the system. Even after ...
Get Operating System Forensics now with the O’Reilly learning platform.
O’Reilly members experience live online training, plus books, videos, and digital content from nearly 200 publishers.