Solved

Company hardrive question?

Posted on 2006-07-17
2
151 Views
Last Modified: 2010-04-11
Hi, there is a user hardrive that has become the object of scrutiny. For one thing the user was surfing and buying things online that turned out to be out of line. My question is if anyone has some suggestions about software that could be used to check around the drive and see what crumbs they may have left. I would appreciate any help with this question. Thanks
0
Comment
Question by:jrtool
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
zwseemm earned 500 total points
ID: 17126887
If you are looking for deleted files use GetDataBack.

If you are just trying to get an idea where they have been go to:
C:\Documents and Settings\%username%\Local Settings\Temporary Internet Files
replace %username% with their name

Also check the history of course
You don't really need to buy software if you are trying to see what they have been doing unless they deleted files.
0
 

Author Comment

by:jrtool
ID: 17126994
Thank you, exactly the information I was looking for.
0

Featured Post

2017 Webroot Threat Report

MSPs: Get the facts you need to protect your clients.
The 2017 Webroot Threat Report provides a uniquely insightful global view into the analysis and discoveries made by the Webroot® Threat Intelligence Platform to provide insights on key trends and risks as seen by our users.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
With the rising number of cyber attacks in recent years, keeping your personal data safe has become more important than ever. The tips outlined in this article will help you keep your identitfy safe.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
Suggested Courses
Course of the Month11 days, 13 hours left to enroll

623 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question