Skip to main content

Table 7 Internet sessions used for experiments

From: Do private and portable web browsers leave incriminating evidence?: a forensic analysis of residual artifacts from private and portable web browsing sessions

Website

Standardized steps

Google

Search for various images, sites, and forums targeted for criminal activity; click on top five links; save/download different files and images

Yahoo!

Search for various sites and forums targeted for criminal activity; click on top five links; save/download available files

YouTube

Search for how-to videos on different types hacking (social media, bank accounts, and WiFi connections); click on links to open

Gmail

Send email with attachments

Hotmail

Send email with attachments

Yahoo! Mail

Send email with attachments

SHSU Mail

Send email with attachments

Online Banking

Log into several accounts (stores cookies and certificates)

Ammunition-to-Go

Attempt to purchase large amounts (2,000+) of ammunition (various high powered rounds) by searching and adding to cart

Online Firearms Store

Search for high capacity magazines and various weapons

Craigslist

Search for different types of items for sale that might be flagged as stolen