Version française   Home | Contact Us


Company servers, like Internet servers, generally record a large amount of information: log-ons, transactions, file transfers into log files. Parameters can be set to govern the contents of these log files and therefore determine the volume of data collected.

Depending on the set parameters, the log files can indicate who logged on, for how long, at what time, and what tasks were performed.

Log files can also indicate who attempted to log in, the identity used and the protocol used. So log files can be used as proof of attempted intrusions (that are a punishable offence in the same way as for successful intrusions).

By analyzing these log files, we can track the path of an e-mail and thus find the true identity of the author.

© 2018 Lerti: Computer forensics - Legal clauses - Computer forensics, evidence collection, traces, electronic investigations - Compiled by Kreatys