HR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONS

Written by Stacey Kumagai


FOR IMMEDIATE RELEASE Contact: Stacey Kumagai, Media Relations Phone: 818/506-8675; Email: mediamonster@yahoo.com

HR MANAGERS USE COMPUTER FORENSICS TO INVESTIGATE EMPLOYEE ALLEGATIONS

Los Angeles, CA --- With companies downsizing, corporations under strict scrutiny fromrepparttar government and businesses finding it essential to be overly protective of proprietary information, times are not only challenging but keeping a close eye on company activities is essential. And corporations conducting internal investigations are onrepparttar 107811 rise. Privately held computer evidence recovery firm, Computer Forensics International (CFI) President, Mark McLaughlin is hard at work helping companies strengthen their cases to protect their best interests utilizing computer forensics. “A services company was accused of wrongful termination and breaching an executive employee contract. CFI examined his laptop revealingrepparttar 107812 disenchanted employee emailed sensitive company information to his friends who were competitors. The action againstrepparttar 107813 company was withdrawn andrepparttar 107814 company initiated a lawsuit againstrepparttar 107815 former executive,” explains McLaughlin.

This is just one of many cases McLaughlin has spearheaded utilizing computer forensics. One ofrepparttar 107816 most common is finding out what employees are doing on valuable company time including surfingrepparttar 107817 Internet for pornography, sending sexually harassing emails to other employees, destroying or stealing valuable inside company information, or sharing that information with competitors or taking clients fromrepparttar 107818 company to start up an outside independent business.

Use the HOSTS File to Block Web Sites

Written by Stephen Bucaro


---------------------------------------------------------- Permission is granted forrepparttar article below to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made andrepparttar 107810 byline, copyright, andrepparttar 107811 resource box below is included. ---------------------------------------------------------- Userepparttar 107812 HOSTS File to Block Web Sites

By Stephen Bucaro

When you type a domain name into your Web browser, Internet Protocol contacts a computer that is a domain name server to look uprepparttar 107813 IP address ofrepparttar 107814 Web site. Inrepparttar 107815 early days,repparttar 107816 Internet didn't need domain name servers. Every computer had a file named HOSTS that listedrepparttar 107817 domain name and IP address ofrepparttar 107818 systems connected torepparttar 107819 Internet.

Even today when your Web browser needs to resolve a domain name to an IP address, it first looks for a file named HOSTS onrepparttar 107820 local computer. In Windows NT,repparttar 107821 HOSTS file is located in c:windowssystem32drivers. In Windows 9x,repparttar 107822 HOSTS file is located in c:windows.

Becauserepparttar 107823 HOSTS file is no longer required, you may not find it on your computer. Instead, you might find a file named HOSTS.SAM,repparttar 107824 SAM extension meaning "SAMPLE". You might also find a file named LMHOSTS. The LMHOSTS file was used to resolve NetBIOS names to IP addresses.

The HOSTS file is simply a text file with a list of IP addresses and their respective domain names. You can openrepparttar 107825 file with Windows Notepad. The HOSTS file may list only one IP address,repparttar 107826 loopback address, as shown below.

127.0.0.1 localhost

To block a Web site, enter an IP address that is not allowed forrepparttar 107827 Web. For example, any IP address withrepparttar 107828 first digit of 0 would be onrepparttar 107829 local network. Any IP address withrepparttar 107830 first digit of 127 is looped back. Then map that IP address torepparttar 107831 domain name that you want to block.

Cont'd on page 2 ==>
 
ImproveHomeLife.com © 2005
Terms of Use