O'Reilly logo

Operating System Forensics by Ric Messier

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 7

Tracking Artifacts

Abstract

Obtaining location information that is stored on systems, including ways of locating systems based on their Internet protocol addresses.

Keywords

operating systems
forensics
operating environments

INFORMATION INCLUDED IN THIS CHAPTER:

Location Information
Document Artifacts
Shortcuts and links

Introduction

Tracking information can give a lot away about users and they may not even realize that it is happening. There are a number of ways that users can be tracked, whether it is their activities on the system or their locations, when they are attached to networks. Applications also leave artifacts that can be tracked long after the document that was created by the application has left the system. Even after ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required