HR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONSWritten by Stacey Kumagai
FOR IMMEDIATE RELEASE Contact: Stacey Kumagai, Media Relations Phone: 818/506-8675; Email: mediamonster@yahoo.com HR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONS Los Angeles, CA --- With companies downsizing, corporations under strict scrutiny from government and businesses finding it essential to be overly protective of proprietary information, times are not only challenging but keeping a close eye on company activities is essential. And corporations conducting internal investigations are on rise. Privately held computer evidence recovery firm, Computer Forensics International (CFI) President, Mark McLaughlin is hard at work helping companies strengthen their cases to protect their best interests utilizing computer forensics. “A services company was accused of wrongful termination and breaching an executive employee contract. CFI examined his laptop revealing disenchanted employee emailed sensitive company information to his friends who were competitors. The action against company was withdrawn and company initiated a lawsuit against former executive,” explains McLaughlin. This is just one of many cases McLaughlin has spearheaded utilizing computer forensics. One of most common is finding out what employees are doing on valuable company time including surfing Internet for pornography, sending sexually harassing emails to other employees, destroying or stealing valuable inside company information, or sharing that information with competitors or taking clients from company to start up an outside independent business.
| | Use the HOSTS File to Block Web SitesWritten by Stephen Bucaro
---------------------------------------------------------- Permission is granted for article below to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and byline, copyright, and resource box below is included. ---------------------------------------------------------- Use HOSTS File to Block Web SitesBy Stephen Bucaro When you type a domain name into your Web browser, Internet Protocol contacts a computer that is a domain name server to look up IP address of Web site. In early days, Internet didn't need domain name servers. Every computer had a file named HOSTS that listed domain name and IP address of systems connected to Internet. Even today when your Web browser needs to resolve a domain name to an IP address, it first looks for a file named HOSTS on local computer. In Windows NT, HOSTS file is located in c:windowssystem32drivers. In Windows 9x, HOSTS file is located in c:windows. Because HOSTS file is no longer required, you may not find it on your computer. Instead, you might find a file named HOSTS.SAM, SAM extension meaning "SAMPLE". You might also find a file named LMHOSTS. The LMHOSTS file was used to resolve NetBIOS names to IP addresses. The HOSTS file is simply a text file with a list of IP addresses and their respective domain names. You can open file with Windows Notepad. The HOSTS file may list only one IP address, loopback address, as shown below. 127.0.0.1 localhost To block a Web site, enter an IP address that is not allowed for Web. For example, any IP address with first digit of 0 would be on local network. Any IP address with first digit of 127 is looped back. Then map that IP address to domain name that you want to block.
|