Computer forensics is a lot like the CSI investigation programs on the television. Using advanced techniques and technologies, a computer forensic scientist will reconstruct a possible crime using the data on computer systems. This data may include email trails, files, hidden directories and other related clues.
While all computer languages are created with ones and zeros, it’s much easier to track what was done when, although by whom continues to be problematic. Forensic science has done well to keep up with the task of tracking and tracing what is done and creation of a timeline in an attempt to reconstruct a possible crime. Although it’s possible to clean and remove data from a hard drive, most people simply think that a delete key really removed the data. In actuality, the delete key simply removed the file location from an index file and the actual data is still safely on the system. It’s up to the data recovery skills of the forensic computer personnel to capture and restore that data without modification.
Computer forensics can be used to track emails, instant messaging and just about any other form of computer related communications. Packet sniffers can literally be placed within a data stream and provide information on what’s running through the network in real time. This is really phenomenal considering the millions upon millions of data packets moving through any individual part of the network.