Important: This article is about the , The best of inspiration updated regularly with new designs and info, and featuring the best
Originally Answered: What are the best sites?
, We Always give correct and complete information about , This document provides We want to improve the quality of content for all. By using information about the content you have received, those involved in providing info in .

Advertisement

Monday, September 10, 2018

The Differences Between SodaStream Models






Many people want to get a SodaStream but have no idea which model is best for them. It can be difficult to choose, especially when the SodaStream company has no information highlighting the differences between the models. Here is a brief overview explaining which features are unique to the models.

There are currently eight SodaStream models available. They are The Revolution, The Source, The Fizz, The Crystal, The Pure, The Fountain Jet, The Dynamo and The Genesis. First, let's address the similarities of all eight types. All of the eight models can make soda or sparkling water in the convenience of your home. All come with "stay fizzy" bottle closures that keep the carbonation in longer. All are compatible with the standard 14.5 ounce carbonation cylinder which is capable of carbonating up to sixty liters of soda or sparkling water.

There are four models which are capable of using either the 14.5 ounce carbonation cylinder or the larger 33 ounce cylinder, which is capable of carbonating up to 130 liters of soda or sparkling water. Those four models are The Revolution, The Dynamo, The Fountain Jet and The Fizz.

All eight models use the CO2 tank as a power source to carbonate. The Crystal, The Pure, The Dynamo, The Fountain Jet and The Genesis require no additional power source to operate. The Fizz and The Source do require a battery to operate the display components. That battery is included. The Revolution is the only model which requires electricity to work. Keep this in mind, as it will need to be near an outlet when used.

The Crystal comes with a dishwasher safe glass carafe. The other seven models come with BPA-free plastic bottles that are not dishwasher safe. You can buy dishwasher safe bottles separately that are compatible with those seven models, but you can not use the glass carafe with any model other than the Crystal.

The Dynamo, The Fountain Jet, The Pure, The Fizz and The Genesis all require the user to twist the bottle into place. The Crystal, The Revolution and The Source all lock the bottle into place without twisting, making them a little easier to use.

There is only one fully automated SodaStream available at this time. That is The Revolution. You simply press a button to tell it how carbonated you would like your drink and it does the rest for you. It also measures the CO2 levels to let you know how much is left in your carbonation cylinder. The Fizz is not automated but it does monitor and display the amount of carbonation in your drink as well as the level of CO2 in your cylinder. The Source has three LED lights to let you know how much carbonation is in your drink, but does not monitor the CO2 left in your cylinder.

I hope I have shed some light on what makes each SodaStream model unique. Click HERE for more information on SodaStreams and to see how the different models look. Remember, this will probably sit on your counter at all times, so you'll want something that looks good in your kitchen.






I Will Definitely Buy Real Estate Within A Year

Investing in real estate has become a trend in India. Not only the residents, NRIs are also showing a great interest in Indian properties. Owning a house is a symbol of prosperity but owed more reflects affluence. Despite the fact that investing in Gold and Mutual Funds is more convenient and beneficial, real estate tops the list. 2007 was considered as the golden era of real estate in India and the boom subdued subregually but looks like 'Achhe Din' are back. The number of home buyers is rising. There would always be a need for homes to live in, so this makes sense to buy a property. Let us see some facts that one need to know before buying a property this year.

1. For living purposes, one needs four walls and a roof, so that's a necessity. But the return on investment is ascertained. Within a small duration like a year or so, the appreciation is going to be fairly flat. The magic can happen only when the Govt. plans something for the better infrastructure of the location. When the growth is only 4 to 5%, it is not wise to pay 9.5% on the loan drawn for the purchase of the property. This was about when one wanted to liquid the assets for a shorter duration of time. If one plans to hold the property for more than 5 years, real estate turnout can actually be good.

2. The ready-to-move properties are preferred over the under-construction ones because the return is instant in case one gives the house on rent and there is no possession delay. With the rise in inflation and decrease in the need for comfort and convenience, affordable housing units are selling fast and for the young people or newlyweds, rent is a more probable option. One should keep renting a house if the monthly EMIs are more than the monthly rent.

3. It is wise to pre-approve the loan so that the property buying is not delayed due to paperwork but there is a catch. One need to finalise the deal within 8 months at stretch, otherwise, the loan processing fees need to be paid all over again. Keep the finances in mind. The larger the down payment, the more loan one can draw from the bank and lesser would be the EMI. Less EMI means less pressure on the monthly budget. So, before buying a house, try to manage the down payment as much as possible.

4. Location, location, location! One should never forget the oldest rule of buying a property. The houses at the outskirts can be bought at more flexible prices as compared to the city ones. They are just at the peripheral so away from the city hustle but closer to the city life. The prime locations are not in the budget for everyone but these extended locations are connected to all the prime locations and can be a good bargain if one is planning to buy a property this time.

5. Invest in the builder with a good track record and deliverables. If someone is planning to buy a property in the state he is not familiar with, going with the reputed builders is advisable. Instead of going blind, one can hire a professional agent with considerable experience.

The property price in India is leveled. There is no scope for the correction. The builders already have the huge inventory that they need to sell. The price is already the best they can offer, so, buy a property now before there comes a twist in the Indian real estate market.






Completely Free Personal Finance Online - Organizing Personal Finances For Building Wealth






If you want completely free personal finance online help, you are sufficient as organizing personal finances for wealth building has never been easier and there are a ton of online tools and articles that can help guide you to success. Let us cover a few of the best services online for managing your personal finances.

You might want to begin to turn around your personal finances for a number of reasons. You may have bad credit and are looking to improve your credit score for all the benefits good credit provides. You may be facing the more serious side effects of poorly managed personal finances such as bankruptcy, foreclosure, seizures, evictions or other painful hardships.

If you are suffering any of these financial difficulties, my heart goes out to you, I have been there, and it is a very difficult time, but the free personal finance online tools that are available to you now can ensure that you never find yourself back in such a difficult situation.

Here are a few of the completely free personal finance online services to consider:

  1. Mint.com: a completely free website to help with organizing personal finances, budgeting and expenditure tracking that includes a number of helpful tools and suggestions for reducing your expenses and tracking your spending. The service is my number one suggestion as it can be eye opening to see where your money is being sent once you are tracking it properly
  2. Google: harness Google and the wealth of information that is available online with articles from experts ranging on topics from investing in gold to bad credit repair. You name it and there is someone talking about it online and Google can help you find these resources for your research

I could go into a list of other smaller lesser known sites or search engines that track expenses help with budgeting or managing your money, but truly all you need are these two free tools.

What to Look for When Organizing Your Personal Finances

The best advice that can be utilized by one recovering from financial hardship is to make your personal finances and their successful management your # 1 priority. Information is absolutely essential for successful management of your money, but I promise as you continue your research the principles will become second nature to you and you will find your credit improving and your income growing as a natural recourse of your hard work.

There are no excuses and you deserve to improving your personal finances is a lifelong and rewarding journey. With all the completely free personal finance online resources available today you can seize control of your financial life back from your creditors.






The Ultimate Sales Letter






A sales letter is a form of business letter that aims to convince the recipient to buy a product or a service. In other words, a sales letter is a communication tool that symbols the sales talk a marketer should do call prospect customers to action.

Throughout the years, businesses all over the world have been feeling the impact of intense competition. Many companies are formed every month all across the globe, especially in the ever-expanding Internet, where it is estimated that a start up firm is established every hour.

Thus, companies are swooning and are literally battling it all out to get customers. If a company fails to come up with an effective marketing strategy, it would be terminated because competitors would actually strip it off of business.

The rising competition across all industries is extremely benefiting the consumers. Because there is an influx of companies, people can choose which one best suits their needs and offers the best products at the most reasonable prices.

If a company has a good brand, high quality standards and novice purposes, it should get to the intended consumers. But given the very intense competition scene today, it must first struggle to attract the prospective clients' attention.

It is in this need that the popularity of the sales letter is becoming inevitably sound. There are lots of tried and tested marketing and advertising schemes, but still, many companies are not satisfied with results so they hire personnel to compose and distribute sales letters.

The purpose of sales letters

The ultimate sales letter is the one that is attaining its purpose. And every sales letter has generally a single purpose. That is: to persuade people to buy a product or a service.

Purposely, sales letters should use the most effective words and sentences to create a good and lasting impression to the reader, who is considered a prospective client. Turning that prospect into reality would not be a hard challenge if the sales letter would only stick to the basic and necessary elements of an effective sales letter.

For one, an ultimate sales letter should aim to be direct to the point. It should directly address the recipient into buying the product. The letter should not be wordy, but should not be too bossy, however. Because the letter is convincing people, not commanding them, politeness should never be neglected.

A good sales letter also observes the proper technical format. Sales letters are categorized under the business letter group so it should strive to look like any formal business letter. However, studies and polls indicate that effective sales letters do not come with company logos because people would easily be turned off and opt to neglect the letter if the first thing they would see is the logo.

Consumer groups and experts assert that effective sales letters offer readers benefits to a product being offered. There are so many competitive products in the market and almost all of them are similar in many ways. However, consumers want to know the advantage of buying one product brand over buying the competitor.

Good sales letters are also not very wordy. They should be short and should be completely read within a few seconds or about one to two minutes. It is assumed that readers are also busy people who need to attend to other more important things, so absorbing information from letters should be as quick as possible.

Distribution of sales letters

Of course, after crafting a good sales letter, the company's next concern would be how the letter would reach the intended readers. There are many ways how letters are dispatched nowdays. You can still rely on the snail mail, but alternatives are also equally reliable.

Nowadays, most marketers send sales letters through emails. That is because people now find direct or snail mail obsolete. Emails are also easily dispatched, are less cost and could reach the recipients clearly and quickly. It would take seconds before emails are sent.

Sales letters could also be posted at print ads in newspapers, brochures and other ad events. Sales letters communicated through these media should be written addressing the general public, though, the personal element should still be observed.

The ultimate sales letter clearly produces ultimate results. What you reap is what you sow. If you crafted a good and effective sales letter, then, you would certainly get intended results instantly.






How to Remove an Autorun Inf Virus From a Computer

The article describes the procedure for removing an Autorun.inf virus from a computer. The methods compiled here are simple and correct to date. It is, however, recommended that these should be followed carefully to avoid running into problems. Since it is a time-consuming and difficult procedure, you can alternatively approach an expert virus removal support service. It will save you a great deal of time and money.

Autorun.inf virus is a dangerous program that exploits Autorun.inf, a common Windows operating system file to execute itself on removable media and other drives viz. C: in your computer. It can be quite difficult to deal with this virus as it is capable of re-executing itself after being removed. Considering this, we have designed a comprehensive guide that will help you get rid of this virus forever. See below for details.

Instructions:

Click on the Start button and browse to Run. Type 'cmd' in the empty box and press the OK button. It will open the Command Prompt window. Type 'del / a: rhs [drive letter]: autorun.inf' (without quotes and brackets and as is) and hit Enter. For example, it's the C: drive which you want to run this command for. You will type 'del / a: rhs c: autorun.inf' and hit Enter to proceed. You must repeat the command for all the drive partitions viz. D: or E: etc. When done, exit Command Prompt and reboot your computer.

If this method does not work for you and the virus still exists in your computer, exercise this method. Browse to C: drive > Windows > System32 > and Config . Look for csrss.exe, arona.exe, logon.bat, and autorun.inf files. Select and delete all of them one by one. Move to Windows (the directory) again and then the media folder, locate and delete the arona.exe file. Search through all the drives viz. C :, D :, E: etc. for the autorun.inf file and delete it. When done, close all the windows.

Open Registry Editor. Go to Run , type 'regedit' in the Open box, and hit Enter . If prompted for an admin password, you must enter it to continue to Registry Editor. When in the utility, take a backup of the registry before proceeding with registry modification. A registry is the heart of an operating system. Wrong configurations to the registry can lead to permanent system crash or other severe problems in your computer. Since, registry modification is a sensitive and cumbersome process, we recommend you to take help of a professional virus removal support service.

You can either create a system restore point or use the built-in Import and Export feature to backup and restore your registry if so required. When done, browse to HKEY_CURRENT_USER> Software> Microsoft> Windows> CurrentVersion> Policies> System> DisableTaskMgr = 1 . Change the last numeric value to 0 from the thread. Browse to HKEY_CURRENT_USER> Software> Microsoft> Windows> CurrentVersion> Policies> Explorer> NoFolderOptions = 1 and do the same.

Browse to HKEY_CURRENT_USER> Software> Microsoft> Internet Explorer> Mail> Windows> Hacked by Godzilla . Delete the last entry from the thread. Browse to HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> CurrentVersion> Run> MS32DLL . Delete the last entry from the thread. Browse to HKEY_LOCAL_MACHINE> Software> Microsoft> Windows> CurrentVersion> RunOnce> Worms = Systemlogon.bat. Simply delete the last entry. Exit Registry Editor and reboot your computer.

Go to Run again, type 'msconfig', and hit Enter. Highlight the Startup tab and remove checkmark from the button next to MS32DLL. Hit the OK button and choose to exit the window without restart. Go to Recycle Bin and remove all virus files from there. Open your security program viz. antivirus or anti-spyware and update it with latest virus and malware definitions. When updated, run a full scan (recommended) and not a custom one. It will take some time, so wait until it is finished. Prompt the program to delete all the infections which it found during the scanning.

If it's a removable flash drive or CD etc. that has got autorun.inf virus on it, exercise this method. Insert the media in your computer's port while holding and continuously pressing the left Shift key. It will prevent the virus from executing itself. Browse to the location of removable drive and explore it using WinRAR. There you will see all the hidden virus files including autorun.inf, xcopy, kavo, new folder, ravmon, recycler, ms32dll.dll, ms32dll.vbs, and svchost among others. Select each one and hit the Delete key.

As soon as you finish deleting all such files, remove the media from the port. Insert it again in the port and repeat the procedure to make sure that all the virus files have been removed from your computer. This method will only work if other drives viz. C: or D: etc. in your computer are virus free, except the external flash drive or CD that has the virus. If you are unable to see all the hidden files and folders in the drive, click on the Tools tab and navigate to Folder Options. Highlight the View tab, locate Show hidden files and folders, and select it. Hit the Apply button and then OK to close the Folder Options window. Thereafter, you must also run a full system scan from your antivirus or anti-spyware program to make sure that no traces of the virus has been left in your computer.

Additional Tips:

You will need admin privileges to perform some of the abovementioned tasks. If you are unable to carry out these instructions on your computer, reboot it in the Safe Mode with Networking. Do not forget to empty Recycle Bin after deleting all the files as the virus may try to re-execute itself from there.

Besides being cumbersome and time-consuming, virus removal is also a risky process as it involves exploring the roots of the system for virus files and deleting them. Since it's not possible for you to be well-versed with a virus' nature and mechanism due to lack of knowledge and time, you may feel stuck at times, especially while working on an important official or unofficial work. Online virus removal support is the best and trusted way to save yourself from such hassles.

The article is associated with 'How to Remove an Autorun.inf Virus from a Computer'available on vtechsquad.com.






What Do Rats Eat?






Rats eat a wide variety of food. They have voracious appetites and will eat almost anything. They are true omnivorous scavengers, but mostly prefer grain, livestock feed, and meat. Rats have also been known to eat soap, leather, furs, candy, milk, meat, vegetables, poultry, eggs, grain, seeds, fruit, nuts, snails and other rodents. A rat can eat a third of its body weight each day. The rat's main important consumption is water, as it can not survive long without it. Rats need 1/2 to 1 ounce of water daily.

Two main types of rats, brown rats and black rats eat about the same things. But there are slight differences in preferences between the two. Brown rats or Norway rats eat almost any type of food, but they prefer high-quality foods such as meat and fresh grain. These rats require 1/2 to 1 fluid ounce of water daily when feeding on dry food. Rats have keen taste, hearing, and sense of smell.

Roof rats or black rats generally prefer vegetables, fruits and grain, and consume 1/2 to 1 ounce food per day from various sources. They do not readily accept meat or fish. They like cereal grains, chopped apples, sweet potatoes, melons, prunes, pineapple, cookies, donuts, sweet chocolate candy, peanut butter, and tomatoes. They also consume an ounce of water per day.

Rats are nutritionally a little better than mice. Unlike the mouse that nibbles a little at a time, rats eat much more food in one sitting. Like mice, rats can live in freezers and they love to eat frozen food.

Rats have a habit of gnawing when they eat. Their chewing ability helps them to chew and gnaw through almost anything. They gnaw anything softer than their teeth. They gnaw papers, clothes, wood, plastics, water pipes, electric cables and other building materials. Their habit of gnawing causes immunity damage to mankind such as fires, power shortages and flooding.






Beginner's Guide to Computer Forensics

Introduction
Computer forensics is the practice of collecting, analyzing and reporting on digital information in a way that is legally admissible. It can be used in the detection and prevention of crime and in any dispute where evidence is stored digitally. Computer forensics has comparable examination stages to other forensic diplomas and faces similar issues.

About this guide
This guide discusses computer forensics from a neutral perspective. It is not linked to particular legislation or intended to promote a particular company or product and is not written in bias of either law enforcement or commercial computer forensics. It is aimed at a non-technical audience and provides a high-level view of computer forensics. This guide uses the term "computer", but the concepts apply to any device capable of storing digital information. Where methodologies have been stated that they provided as examples only and do not stip recommendations or advice. Copying and publishing the whole or part of this article is licensed solely under the terms of the Creative Commons - Attribution Non-Commercial 3.0 license

Uses of computer forensics
There are few areas of crime or dispute where computer forensics can not be applied. Law enforcement agencies have been among the earliest and heaviest users of computer forensics and inevitably have often been at the forefront of developments in the field. Computers may institute a 'scene of a crime', for example with hacking [1] or denial of service attacks [2] or they may hold evidence in the form of emails, internet history, documents or other files relevant to crimes such as murder , kidnap, fraud and drug trafficking. It is not just the content of emails, documents and other files which may be of interest to investigators but also the 'meta-data' [3] associated with those files. A computer forensic examination may reveal when a document first appeared on a computer, when it was last edited, when it was last saved or printed and which user carried out these actions.

More recently, commercial organizations have used computer forensics to their benefit in a variety of cases such as;

  • Intellectual Property theft
  • Industrial espionage
  • Employment disputes
  • Fraud investigations
  • Forgeries
  • Matrimonial issues
  • Bankruptcy investigations
  • Inappropriate email and internet use in the work place
  • Regulatory compliance

Guidelines
For evidence to be admissible it must be reliable and not prejudicial, meaning that at all stages of this process admissibility should be at the forefront of a computer forensic examiner's mind. One set of guidelines which has been widely accepted to assist in this is the Association of Chief Police Officers Good Practice Guide for Computer Based Electronic Evidence or ACPO Guide for short. Although the ACPO Guide is aimed at United Kingdom law enforcement its main principles are applicable to all computer forensics in whatever legislature. The four main principles from this guide have been reproduced below (with references to law enforcement removed):

  1. No action should change data held on a computer or storage media which may be relied upon in court.

  2. In circumstances where a person finds it necessary to access original data held on a computer or storage media, that person must be competent to do so and be able to give evidence explaining the relevancy and the implications of their actions.

  3. An audit trail or other record of all processes applied to computer-based electronic evidence should be created and preserved. An independent third-party should be able to examine those processes and achieve the same result.

  4. The person in charge of the investigation has overall responsibility for ensuring that the law and these principles are adhered to.

In summary, no changes should have been made to the original, however if access / changes are necessary the examiner must know what they are doing and to record their actions.

Live acquisition
Principle 2 above may raise the question: In what situation would changes to a suspect's computer by a computer forensic examiner be necessary? Traditionally, the computer forensic examiner would make a copy (or acquire) information from a device which is turned off. A write-blocker [4] would be used to make an exact bit for bit copy [5] of the original storage medium. The examiner would work then from this copy, leaving the original demonstrably unchanged.

However, sometimes it is not possible or desirable to switch a computer off. It may not be possible to switch a computer off if doing so would result in considering financial or other loss for the owner. It may not be desirable to switch a computer off if doing so would mean that potentially valuable evidence may be lost. In both these circumstances the computer forensic examiner would need to carry out a 'live acquisition' which would involve running a small program on the suspect computer in order to copy (or acquire) the data to the examiner's hard drive.

By running such a program and attaching a destination drive to the suspect computer, the examiner will make changes and / or additions to the state of the computer which were not present before his actions. Such actions would have remained admissible as long as the examiner recorded their actions, was aware of their impact and was able to explain their actions.

Stages of an examination
For the purposes of this article the computer forensic examination process has been divided into six stages. Although they are presented in their usual chronological order, it is necessary during an examination to be flexible. For example, during the analysis stage the examiner may find a new lead which would warrant further computers being examined and would mean a return to the evaluation stage.

Readiness
Forensic readiness is an important and often overlooked stage in the examination process. In commercial computer forensics it can include educating clients about system preparedness; For example, forensic tests will provide stronger evidence if a server or computer's built-in auditing and logging systems are all switched on. For examiners there are many areas where prior organization can help, including training, regular testing and verification of software and equipment, familiarity with legislation, dealing with unexpected issues (eg, what to do if child pornography is present during a commercial job) and ensuring that your on-site acquisition kit is complete and in working order.

Evaluation
The evaluation stage includes the receipt of clear instructions, risk analysis and allocation of roles and resources. Risk analysis for law enforcement may include an assessment on the likelihood of physical threat on entering a suspect's property and how best to deal with it. Commercial organizations also need to be aware of health and safety issues, while their evaluation would also cover reputational and financial risks on accepting a particular project.

Collection
The main part of the collection stage, acquisition, has been introduced above. If acquisition is to be carried out on-site rather than in a computer forensic laboratory then this stage would include identifying, securing and documenting the scene. Interviews or meetings with personnel who may hold information which could be relevant to the examination (which could include the end users of the computer, and the manager and person responsible for providing computer services) would normally be carried out at this stage. The 'bagging and tagging' audit trail would start here by sealing any materials in unique tamper-evident bags. Consideration also needs to be given to securely and safely transporting the material to the examiner's laboratory.

Analysis
Analysis depends on the specifics of each job. The examiner typically provides feedback to the client during analysis and from this dialogue the analysis may take a different path or be narrowed to specific areas. Analysis must be accurate, thorough, impartial, recorded, repeatable and completed within the time-scales available and resources allocated. There are myriad tools available for computer forensics analysis. It is our opinion that the examiner should use any tool they feel comfortable with as long as they can justify their choice. The main requirements of a computer forensic tool is that it does what it is meant to do and the only way for examiners to be sure of this is for them to regularly test and calibrate the tools that use before analysis takes place. Dual-tool verification can confirm result integrity during analysis (if with tool 'A' the examiner finds artefact 'X' at location 'Y', then tool 'B' should replicate these results.)

Presentation
This stage usually involves the examiner producing a structured report on their findings, addressing the points in the initial instructions along with any subsequent instructions. It would also cover any other information which the examiner deems relevant to the investigation. The report must be written with the end reader in mind; in many cases the reader of the report will be non-technical, so the terminology should acknowledge this. The examiner should also be prepared to participate in meetings or telephone conferences to discuss and elaborate on the report.

Review
Along with the readiness stage, the review stage is often overlooked or disregarded. This may be due to the perceived costs of doing work that is not billable, or the need 'to get on with the next job'. However, a review stage incorporated into each examination can help save money and raise the level of quality by making future examinations more efficient and time effective. A review of an examination can be simple, quick and can begin during any of the above stages. It may include a basic 'what went wrong and how can this be improved' and a 'what went well and how it can be incorporated into future examinations'. Feedback from the instructing party should also be thought. Any lessons learnt from this stage should be applied to the next examination and fed into the readiness stage.

Issues facing computer forensics
The issues facing computer forensics examiners can be broken down into three broad categories: technical, legal and administrative.

Encryption - Encrypted files or hard drives can be impossible for investigators to view without the correct key or password. Examiners should consider that the key or password may be stored elsewhere on the computer or on another computer which the suspect has had access to. It could also reside in the volatile memory of a computer (known as RAM [6] which is usually lost on computer shut-down; another reason to consider using live acquisition techniques as outlined above.

Increasing storage space - Storage media holds ever greater amounts of data which for the examiner means that their analysis computers need to have sufficient processing power and available storage to efficiently deal with searching and analyzing massive amounts of data.

New technologies - Computing is an ever-changing area, with new hardware, software and operating systems being constantly produced. No single computer forensic examiner can be an expert on all areas, although they may frequently be expected to analyze something which they have not deal with before. In order to deal with this situation, the examiner should be prepared and able to test and experiment with the behavior of new technologies. Networking and sharing knowledge with other computer forensic examiners is also very useful in this respect as it's likely someone else may have already encountered the same issue.

Anti-forensics - Anti-forensics is the practice of trying to thwart computer forensic analysis. This may include encryption, the over-writing of data to make it unrecoverable, the modification of files' meta-data and file obfuscation (disguising files). As with encryption above, the evidence that such methods have been used may be stored elsewhere on the computer or on another computer which the suspect has had access to. In our experience, it is very rare to see anti-forensics tools used correctly and frequently enough to totally obscure either their presence or the presence of the evidence that they were used to hide.

Legal issues
Legal arguments may confuse or distract from a computer examiner's findings. An example here would be the 'Trojan Defense'. A Trojan is a piece of computer code disguised as something benign but which has a hidden and malicious purpose. Trojans have many uses, and include key-logging [7], uploading and downloading files and installation of viruses. A lawyer may be able to argue that actions on a computer were not carried out by a user but were automated by a Trojan without the user's knowledge; such a Trojan Defense has been successfully used even when no trace of a Trojan or other malicious code was found on the suspect's computer. In such cases, a competent opposition lawyer, supplied with evidence from a competent computer forensic analyst, should be able to dismiss such an argument.

Accepted standards - There are a plethora of standards and guidelines in computer forensics, few of which appear to be universally accepted. This is due to a number of reasons including standard-setting bodies being tied to particular legislations, standards being aimed either at law enforcement or commercial foreensics but not at both, the authors of such standards not being accepted by their peers, or high joining fees dissuading practitioners from participating.

Fitness to practice - In many jurisprudence there is no qualifying body to check the competency and integrity of computer forensics professionals. In such cases anyone may present themselves as a computer forensic expert, which may result in computer forensic examinations of questionable quality and a negative view of the profession as a whole.

Resources and further reading
There does not appear to be a great amount of material covering computer forensics which is aimed at a non-technical readership. However the following links at links at the bottom of this page may prove to be of interest prove to be of interest:

Glossary
1. Hacking: modifying a computer in way which was not originally intended in order to benefit the hacker's goals.
2. Denial of Service attack: an attempt to prevent legitimate users of a computer system from having access to that system's information or services.
3. Meta-data: at a basic level meta-data is data about data. It can be embedded within files or stored externally in a separate file and may contain information about the file's author, format, creation date and so on.
4. Write blocker: a hardware device or software application which prevails any data from being modified or added to the storage medium being examined.
5. Bit copy: bit is a contracting of the term 'binary digit' and is the fundamental unit of computing. A bit copy refers to a sequential copy of every bit on a storage medium, which includes areas of the medium 'invisible' to the user.
6. RAM: Random Access Memory. RAM is a computer's temporary workspace and is volatile, which means its contents are lost when the computer is powered off.
7. Key-logging: the recording of keyboard input giving the ability to read a user's typed passwords, emails and other confidential information.