xympl002027.gif
" we make molehills out of mountains "
xympl002026.gif
xympl002025.jpg
Home Page
xympl002024.jpg
Forensics
xympl002023.jpg
Data Recvry
xympl002022.jpg
Full Erase
xympl002021.jpg
System Fail
xympl002020.jpg
Virus
xympl002019.jpg
Malware
xympl002018.jpg
Backups
xympl002017.jpg
Software
xympl002016.gif
xympl002015.jpg
Internet
 You are currently viewing: XYMPL - Computer Forensics - Page 01
xympl002014.jpg
Networks
xympl002013.jpg
xympl002012.jpg
xympl001014.jpg
Computer Forensics
xympl001013.jpg
xympl001012.jpg
xympl002011.jpg
Wireless
xympl002010.jpg
File Convrt
xympl002009.jpg
Business
xympl002008.jpg
Seminars
xympl002007.jpg
Data Comms
xympl002006.jpg
Contact Us
xympl002005.jpg
Training
xympl002004.jpg
Spare bit !
xympl002003.jpg
<< Prev Page
xympl002002.jpg
Next Page >>
xympl002001.jpg
xympl001001.gif
ISCFE Certified Forensic Computer Examiner
www.isfce.com
 
 
Trained by US based Key Computer Systems, Forensic acquisitions and examinations are carried out to comply with exacting standards. Full forensically sound methodologies and equipment are used throughout, with complete Chain of Custody maintained. Comprehensive reports are provided, together with expert witness services if required
Computer Content Audits (CCA): Much less invasive (and much less time consuming) than a full forensic analysis, a standard CCA uses Computer Forensics knowledge and tools to specifically target known locations for the presence - or unusual absence - of internet usage artifacts and histories, and reviews these. A cost effective solution to check for inappropriate computer use. Custom CCA's can also be provided to meet specific client needs.
Forensic Services available include: