Electronic Searching in Discovery

Electronic Searching in Discovery

Electronic Searching in Discovery If you have any type of computer, smart phone, or personal home IoT device, electronic searches are a daily part of your routine. The word “search” is to look for something, but we more often use the word to refer to a specific...
Does metadata stay when attached to an email?

Does metadata stay when attached to an email?

Does metadata stay when attached to an email? We recently received the question of whether or not file metadata stays with a file when it is emailed. The answer is usually yes, but it can be a little more complex. Metadata First, metadata is the information about the...
IP Addresses: A Primer

IP Addresses: A Primer

IP Addresses: A Primer Most people have heard the phrase “IP address” on TV crime shows or while diagnosing a tech issue, but if you think about it longer, you may find you have questions. “What even are IP addresses? Where do they come from? What do they mean?”...
How Those Pesky Pop-Ups Can Help Your Digital Forensics Case

How Those Pesky Pop-Ups Can Help Your Digital Forensics Case

How Those Pesky Pop-Ups Can Help Your Digital Forensics Case Digital forensics has been described as explaining what someone was doing at their keyboard. Forensic examiners will look at a variety of files and metadata to walk through every website visited, email...
Remote Access Applications: Signs of Trespassing

Remote Access Applications: Signs of Trespassing

Remote Access Applications: Signs of Trespassing Why this is important: Software that allows remote access to computers keeps logs to identify which computers were accessing the computer, when, and sometimes what they were doing. This can be critical in identifying...