Monday 20 June 2011

Computer Forensics -Software Encase-

          Computer Forensics  are able to copy all data from Hard disk bit per bit without changing the original data, which will not change the evidence. And copied data is analyzed, such as finding a suspicious file. Check e-mail and Web site. And recover deleted files. As well as reports continue to be analyzed.


 Sample Data from Encase
 -Identified the suspect as the perpetrator.
- Identified who conspired with the perpetrator.
- Identified websites that users access the computer.
 - E-mail is sent and received.
- The file was deleted and hidden files.
- Personal information such as financial information, address, etc..
- The ability and interests of the person.

Consultants & Services in Thailand !!
hi-tech@orioninv.co.th
02-714-3801-3#1
www.orioninv.co.th

Wednesday 15 June 2011

Email and Website Investigations and Monitoring

                 Emails and the internet are the modern tools used by cyber-criminals and those intent on causing financial damage and disruption to legitimate businesses. These tools have been a major factor in the proliferation of illegal trade in counterfeit products which infringe trademark or copyright.



           Often the perpetrators utilise a wide range of tools and tricks in an attempt to remain anonymous. However, there is an equally wide range of tools and tricks available to obtain information about them. We can provide careful analysis of this information and vital clues about the operators of websites and senders of emails which, if interpreted properly, can lead to their identification, location and prosecution.
                    We also provide internet monitoring services for clients who wish to monitor the internet in general or particular sites for specific behaviour such as selling products infringing their trademarks or copyrights. The Orion Hi-Tech Unit have a successful track record in tracing a variety of organizations who were using spam, websites, message boards and auction sites to conduct illegal activities.

Free Consultanting with an expert .

Tuesday 14 June 2011

Computer Forensics -Data Recovery Consultants & Services in Thailand

                  Data lost by malicious attack, user error or hardware malfunctions can often be very costly and in some cases disastrous. Often the valuable information can be recovered through the use of computer forensics software. The Orion Hi-Tech Unit provides data recovery services which can retrieve priceless and irreplaceable information, saving you time and money and preventing business disruption.


                   If your operating system can no longer locate or identify the hard disk on your computer we may be able to help you retrieve and recover data.

                   If hardware problems are threatening to lose your priceless information we can access the information as the hard disk may be accessible through alternative means.

                  If user error has caused files to be deleted inadvertently or malicious intervention has caused file loss we can try and retrieve the valuable data for you.

                  Before you give it up as lost we may be able to save your files, your data, your time and your money.

                 If you are based in Thailand our specialist staff can travel to you. Our team of experts can also travel overseas if necessary. Alternatively if suitable the hard disk can be sent to us for analysis on site at Orion Investigations in Bangkok.

Free Consulatants & Services
02-714-3801-3#141

Sunday 12 June 2011

Computer Forensics Electronic Data Acquisition and Analysis


     Electronic Data acquisition and analysis are invaluable in cases where a computer has been used during the committing of a crime or a computer has been the target of a crime.



    Typical cases include investigations of employees for fraud, theft, inappropriate internet access, unauthorized file access and distribution and also estimating damages in civil litigations.
    Forensically sound equipment and methods mean that the data gathered meets the standards required by law enforcement agencies and courts, ensuring the best chances of a successful conclusion to the case or investigation.


    As well as easily accessible information, it is also possible to acquire information from the computer storage device that may be inaccessible by standard methods such as information in deleted, overwritten or damaged files, information deliberately hidden by the owner or information stored outside normal storage areas. Even if the perpetrator thought the information was out of reach we may help you to retrieve the vital piece of evidence that is the final piece of the jigsaw.


     We work very closely with the client during the analysis of the evidence in order to conduct targeted and delicately formulated searches through the acquired data. This helps our clients to obtain as much specific detail as efficiently as possible, enabling them to make a faster decision on how to proceed with any further action. The information obtained and the methods used to obtain it are then reported in an accessible format according to the client’s requirements. Where necessary expert testimony is provided to present the evidence in court.


      The Orion Hi-Tech Unit provides on-site and laboratory computer forensics services. We can come to you or you can send the storage devices to us, whichever solution meets your specific budget and timeframe.

Free ! Consulting with an expert
hi-tech@orioninv.co.th
02-714-3801-3#141
www.orioninv.co.th

Wednesday 8 June 2011

Internal Corporate Hi-Tech Investigations

The Orion Hi-Tech Investigation Unit offers the following services and solutions to support Human Resource, Corporate Security and Legal departments in protecting their company's confidential data -



*Assist in securing electronic information to help eliminate the possibility of employees maliciously or accidentally deleting electronic files and to reduce costs when meeting discovery requirements if the company is involved in litigation by introducing electronic information policies and procedures.

*Introduce procedures for protecting electronic evidence in the event that an employee resigns or is dismissed.

*Provide training to HR, management and other staff on the benefits of sound electronic information policies and procedures.

*Ensure that employees follow corporate policies on internet usage and ensure that the company keeps legally required logs of employees’ internet access.

02-714-3801#3

  




Monday 6 June 2011

บทบาทของ Computer Forensic ในภาคองค์กรธุรกิจ

                              อาชญากรรมทางคอมพิวเตอร์(Computer Crime)นั้น หลายองค์กรอาจมองเป็นเรื่องไกลตัว ไม่น่าที่จะเกิดขึ้น จึงไม่ได้ตระหนักถึงการป้องกันภัยคุกคามทั้งจากภายในและภายนอกองค์กร รวมทั้งการวางระบบเทคโนโลยีสารสนเทศที่มีประสิทธิภาพและมีความปลอดภัย ทำให้บางครั้งเกิดความเสียหายขึ้นอย่างไม่คาดคิด และกระทบต่อผลประกอบการและภาพลักษณ์ขององค์กรอย่างไม่อาจประเมินค่าได้
                           การรวบรวมและวิเคราะห์ข้อมูลอิเลคทรอนิคส์มีประโยชน์อย่างมากต่อธุรกิจในการป้องกันและแก้ไขปัญหา หากมีการใช้คอมพิวเตอร์ในการกระทำผิด Computer Forensic จะช่วยรวบรวมหลักฐานและสืบหาตัวผู้กระทำผิดได้ บริการ Computer Forensic ในภาคองค์กรธุรกิจไ ด้แก่ บริการการตรวจสอบการทุจริต การโจรกรรมข้อมูล การใช้งานอินเตอร์เนตอย่างไม่เหมาะสม การเปิดดูข้อมูลที่เป็นความลับ นำข้อมูลนี้ไปขายให้กับบริษัทคู่แข่ง การเข้าถึงและเผยแพร่ข้อมูลโดยไม่ได้รับอนุญาต รวมทั้งนำข้อมูลไปดำเนินการทางกฎหมาย
                              Computer Forensic นั้นเป็นเหมือนกับส่วนหนึ่งของระบบรักษาความปลอยภัยขององค์กรในการควบคุมการทำงานของพนักงาน และป้องกันความเสียหายของข้อมูลทางธุรกิจ เพราะ Computer Forensic เป็นเครื่องมือในการระบุความผิดของพนักงานหาจุดบกพร่องในระบบขององค์กร จนถึงการค้นหาหรือเก็บหลักฐานสำคัญไว้ใช้ในการดำเนินคดีกับบุคคลที่ทำความผิด


hi-tech@orioninv.co.th
02-714-3801-3#141
http://www.orioninv.co.th/th/s_hitech1.html

Thursday 2 June 2011

How Computer Forensics Works ?


      Bit-stream copy
     Bit-by-bit copy of the original storage medium
     Exact copy of the original disk
     Different from a simple backup copy
     Backup software only copy known files
     Backup software cannot copy deleted files, e-mail messages or recover file fragments
     Bit-stream image
     File containing the bit-stream copy of all data on a disk or partition
Also known as forensic copy

Hi-tech Investigation Unit
hi-tech@orioninv.co.th
http://www.orioninv.co.th/th/s_hitech1.html