Obtaining location information that is stored on systems, including ways of locating systems based on their Internet protocol addresses.
Keywords
operating systems
forensics
operating environments
INFORMATION INCLUDED IN THIS CHAPTER:
• Location Information
• Document Artifacts
• Shortcuts and links
Introduction
Tracking information can give a lot away about users and they may not even realize that it is happening. There are a number of ways that users can be tracked, whether it is their activities on the system or their locations, when they are attached to networks. Applications also leave artifacts that can be tracked long after the document that was created by the application has left the system. Even after ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.