Arif works for a university as an IT administrator. He received a call on Sept 8, 2009 from a sta member
Amy who complained that a suspicious account has been created on her personal laptop without her
consent. The general IT policy of the university disallows Arif to acquire any research-related les from
Amy's laptop because she is participating a top-secret government project. Therefore, Arif asked Amy
to export the Windows Registry and copy a few Windows log les of her laptop from the directory
Amy copied 5 les and compressed them in to a ZIP le named \[url removed, login to view]". Now, Arif receives a
copy of the ZIP le and starts to analyze what took place on Amy's laptop (IP: [url removed, login to view]).
7 freelance font une offre moyenne de $148 pour ce travail
Hi.. Check my work history. I am the number 1 in technical writer IT security/f digital forensic/network administration. I have completed 185+ projects. I can assure you quality work. Come to chat for details.
Hello there i am a UK web security i am Certified Ethical Hacker i have worked for large companies include eBay , Microsoft i can show you proof of this. thank you Jordan