Chapter 8

Internet and e-mail

Abstract

E-mail and Internet evidence can play a vital role in any investigation. Chapter 8 examines the technologies behind the Internet such as HTTP, IP addressing, Peer-to-Peer networks, chat clients, and web browsers. It also covers reading e-mail headers and ways to conceal the sender’s identity.

Keywords

Uniform Resource Locator (URL)
Gnutella
Peer-to-Peer (P2P)
INDEX.DAT
cookies
Temporary Internet Files (TIF)
NTUSER.DAT
Internet Relay Chat (IRC)
Simple Mail Transfer Protocol (SMTP)
Post Office Protocol (POP)
Spoofing

“The Internet is the crime scene of the 21st Century.”

— Manhattan District Attorney Cyrus Vance, Jr.

Information in this chapter
Overview of the Internet and How It Works
How Web ...

Get The Basics of Digital Forensics, 2nd Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.