HR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONS

Written by Stacey Kumagai


Continued from page 1

A prime example of this involves a case CFI has worked on with a nationwide services company. They suspected a key executive was resigning to work for a competitor and taking confidential files to assist them. Using a pretext they obtained his company laptop in advance of his departure. CFI's analysis revealed hidden email communications with his future employer andrepparttar creation of a confidential Zip archive of files. The company thwartedrepparttar 107811 transfer of data and received a stipulated judgment againstrepparttar 107812 future employer and employee.

Mark McLaughlin has amassed nearly 25 years experience in computer forensic analysis, corporate security investigations, information systems management and law enforcement. He's a frequent lecturer and California State Bar qualified instructor for attorneys on computer forensics.

For interviews with Mark McLaughlin or for more information, contact Stacey Kumagai at 818/506-8675 or go torepparttar 107813 Computer Forensics International website at: www.cf-intl.com

-30-



Stacey Kumagai is CEO of Media Monster Communications, a full-service public relations, marketing & media firm.


Use the HOSTS File to Block Web Sites

Written by Stephen Bucaro


Continued from page 1

For example, suppose you want to block a porn site that your teenager has been visiting, you might add an entry likerepparttar one shown below.

127.0.0.2 www.pornsite.com

Banner ads are usually hosted on an advertiser's domain and linked to sites all overrepparttar 107810 Web. Suppose you want to block annoying banner ads displayed at a site that you visit frequently. You might add an entry likerepparttar 107811 one shown below.

127.0.0.3 www.adserver.com

Then when a file from that domain name is requested, instead ofrepparttar 107812 porn site orrepparttar 107813 banner being displayed,repparttar 107814 browser will displayrepparttar 107815 message "The Page Cannot be Displayed".

When you saverepparttar 107816 HOSTS file after editing, make sure thatrepparttar 107817 file name does not have an extension. Sometimes Windows Notepad addsrepparttar 107818 extention .txt.

The HOSTS file is a quick, easy way to block access to a Web site. But if you use this method to block a porn site that your teenager has been visiting, make sure they don't find this article. ---------------------------------------------------------- Resource Box: Copyright(C)2002 Bucaro TecHelp. To learn how to maintain your computer and use it more effectively to design a Web site and make money onrepparttar 107819 Web visit http://bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter Send a blank email to mailto:bucarotechelp-subscribe@topica.com ----------------------------------------------------------

None


    <Back to Page 1
 
ImproveHomeLife.com © 2005
Terms of Use