Orange Computer Solutions
Onsite and Lab Service for
Small Business and Residential Clients
PO Box 4321
Orange, California 92863-4321
Call Robert (714) 222-2140

Email: ocsolutions@earthlink.net

Web: http://www.orangecomputersolutions.com
License: E 85118
Bureau of Electronic and Appliance Repair
Software Diagnosis and Repair
System Tune-Up and Optimazation
Virus and Malware Removal
Data Recovery and Forensic Examinations
Data Encryption
Software Installation
Printer Setup
Network Security/Firewall
System Upgrades
Wireless Solutions
Data Cabling/Network Installation
And More...
Homepage
About Us
Contact Info

Data recovery is needed when serious problems affect your computer and you have not recently backed up your user files. These problems could range from a virus to a hard drive in the process of failing; both of these are very common problems. We can help in these cases, 95% of the time we are very successful in our efforts to recover your files.

Computer Forensic Examinations are necessary when indications of illicit activity are suspected to be found on a computer or any device with memory. It can be useful to a parent worried about what their child is looking at or doing on their computer. It can be useful to attorneys when looking for evidence to either prove or disprove whether something happened. It can be useful to employers that need to know what their employees are doing on company computers. It can get the who, what, why, when and where something happened.

Things we can find are:

1.The timeline of all activity on a computer, including names of files that were deleted, even after the Recycle Bin is emptied. It details when the computer was on or off and can identify past users whose accounts have been deleted. The timeline of activity must be for a short time period and must be specified to keep the timeline managable. This can be helpful for employers and attorneys to establish if a person was using their computer during a given time frame and what they were doing during that time.

2. Complete files of any type: documents, spreadsheets, pictures, databases, QuickBooks, etc. This is the only recovery where the specific user logon of the computer can be identified. For JPEG pictures from digital cameras, we can use face recognition software to quickly identify people if a good picture of that person is available for reference. This also applies to pictures that were recovered using the method in item 3 below.

3. Deleted files where the surface area of the drive they were on has not been overwritten.

4. Unique words, phrases, names of people, businesses or places, telephone numbers, credit card numbers, Internet searches or any other unique lines of text that you provide for us to search for on any drive or in any stream of data. This can find evidence in remnants of files that have been partially overwritten.

5. Remaining bits of partially overwritten pictures on any drive or in any stream of data.

6. GPS (Global Positioning System) data from pictures taken with a smart phone or camera that records GPS data with each picture can be recovered. The date and time as set on the phone or camera is always present as well as the manufacturer and model number of the camera. This data can also be found in file remnants even if the picture is not recoverable. This is useful to find out the physical locations the user(s) have been at, and the times and dates they were there. If the camera can be acquired it may also yield additional data.

7. GPS mapping devices that have been backed up to the computer contain more location data. This data can also be found in file remnants. Should this be present it is very useful to find out the physical locations the user(s) have been at. If the GPS device is available and the data from the device can be acquired it may yield additional information.

8. Facebook data can be found allowing the creation of a list of those people that the user(s) know. This applies only if one or more of the users used Facebook. This data can also be found in file remnants.

9. iPhone data can be backed up using iTunes. If a user has done this, it can yield even more data. If the iPhone can be acquired, it can yield more and newer data.

A stream of data can be acquired from any internal or removable hard drive, solid state drive (SSD), flash or thumb drive, camera memory card, cell phone memory card, GPS device memory card, floppy disk or any other memory that can be physically accessed.

The above streams of data will be acquired using read-only equipment thus preserving the original. This can be done in our lab or at your site, but can take several hours depending on the length of the data stream. If you have any "chain of custody" or "chain of evidence" requirements thought must be given to where this is done. We have the legal paperwork to track this information.

If you can remove a person from a scene during an illicit activity in progress, leaving the computer powered on and untouched we can come to your site and capture a copy of the memory stream of the computer in use. This can be very valuable if the person did not save any evidence to the hard drive or if the hard drive has full disk encryption. You will need to keep moving the mouse slightly to prevent the computer from going to sleep or to a screensaver if an unknown password is being used. Do not shutdown the computer in this situation. Keep the laptop power supply plugged in to prevent any shutdown due to a low battery.

You will need to specify what you are looking for to keep the scope of the search on target. We will work with you to separate relevant files and data in the least amount of time.

We can prepare a report containing the relevant information regarding your situation. These reports are unique and we will work with you on a presentation that will meet your requirements. It is best that this be discussed at the beginning to insure everything required in the report is separated out during the examination of the data to avoid any duplication of work or delays.

It is strongly recommended that you engage our computer forensic examination services through your attorney or private investigator if there is any possibility that the results of the examination ends up in litigation or court; this will help your forensic analysis to be admissible in court. Working through an attorney also provides you with the benefit of the attorney client privilege.

Please call us at 714-222-2140 to discuss your situation.