1) Web browsers such as Edge, Chrome, Firefox, and Internet Explorer leave artifacts on the system, containing information which many be important during a computer forensics examination. These artifacts include browsing history, cache, cookies, typed URLs, sessions, most visited sites, screenshots, financial information, form values, downloaded files, favorites, and many other types of artifacts (Skulkin & Mikhaylov, n.d.). With the various information provided by the artifacts, forensic examiners can retrieve information such as dates and times of when things were accessed. This specific information can be extremely helpful in terms of helping to establish a timeline in regards to the investigation. In addition, analysis conducted on web browser artifacts can help corroborate other types of evidence within a case, as well as evidence of intent or the state-of-mind of an individual (Hacker, n.d.). Information regarding web searches can be recovered from browser artifacts, proving vital in a case.
For example, web searches of terms such as “how to kill my wifeâ€, “untraceable poisonâ€, and “how to dump a body†would appear extremely incriminating for a suspect whose wife’s disappearance is under investigation. Coupled with dates and times of the search history occurring just prior to the disappearance and additional evidence such as witness statements; analysis of the artifacts would help establish a timeline and strengthen the case against a suspect.
2) A system log is a tool that registers all the events in the operating system of computers and mobile devices. These events are normally set up by an operating system in use. system log contains information about the systems, hardware changes and all the other activities going on inside the computer. Because of the increased amount of computer-related threats, and crime now a day, System log is crucial for a computer forensic examination.” Computer Forensic involves obtaining and analyzing digital information for use as evidence in civil, criminal and administrative cases”(Nelson,B,et al, 2008). System log stores all the events happening in the operating system. This helps the examiner find evidences that can be bestowed in a court of law to prove or disapproved a case.
Event Viewer is a window tool that displays all the events log in the system. These features provide detailed information about meaningful events on a data processing machine. Through this application, one can navigate, search, and view different types of logs, export them for analysis and much more.
Internet information system (IIS) is a web software designed for the window. It is used to obtain demands from remote end-user computers along with help restore the applicable feedback related to it. It allows the webserver to share and deliver data across the network. That is something forensic examiner can use to gather information about trend activity such as an hourly strike to crucial files and any malicious activities.








Jermaine Byrant
Nicole Johnson



