Help
RSS
API
Feed
Maltego
Contact
Domain > forensical.com
×
More information on this domain is in
AlienVault OTX
Is this malicious?
Yes
No
DNS Resolutions
Date
IP Address
2013-07-01
184.172.186.64
(
ClassC
)
2025-01-17
192.185.186.160
(
ClassC
)
Port 80
HTTP/1.1 200 OKDate: Fri, 17 Jan 2025 02:42:50 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Sun, 07 Jul 2013 01:23:45 GMTAccept-Ranges: bytesVary: Accept-EncodingTransfer-Encoding: chunkedContent-Type: text/html !DOCTYPE html PUBLIC -//W3C//DTD HTML 3.2//EN>html>head>title>Forensical Investigations - Computer Forensics and Electronic Discovery/title>meta http-equivContent-Type contenttext/html; charsetutf-8 />meta namerobots contentALL>meta namedistribution contentGlobal>meta namedescription contentForensical Investigations provides computer forensic and network security services for law firms, businesses and law enforcement agencies in Los Angeles.>meta namekeywords contentforensical, electronic evidence, data discovery, data restoration, evidence, computer forensics, expert witness, computer evidence consulting, computer risk management, computer fraud, computer security, computer generated evidence, computer crime consulting, computer crime investigation, computer discovery, computer forensic analysis, data recovery, data security discovery, digital evidence, digital legal discovery, digital media law discovery, e-mail discovery, e-mail evidence, e-mail crime, electronic discovery, electronic forensics, electronic legal discovery, electronic records fraud, electronic risk control, electronic document discovery, evidence recovery, evidence recovery consulting, electronic evidence, electronic evidence discovery, forensic analysis, forensic computer consultant, forensic, hidden data, hidden files, lost data, litigation data recovery, risk management, recovery technology, media recovery, los angeles, northridge, california, cyber,>style typetext/css>!--.header { font-family: Georgia, Times New Roman, Times, serif; font-size: 16px; font-weight: bold; color: 002889;}.default { font-family: Georgia, Times New Roman, Times, serif; font-size: 10px;}.headersmall { font-family: Georgia, Times New Roman, Times, serif; font-size: 12px; font-weight: bold; color: 002889;}.title { font-family: Georgia, Times New Roman, Times, serif; font-size: 16px; font-weight: bold; color: #333333;}--> /style>script src/google_analytics_auto.js>/script>/head>body bgcolor#DDDDDD text#000000 link#990033 vlink#990033 alink#990033 classdefault> div aligncenter> table width600 border0 cellpadding0 cellspacing0> tr> td>table width560 border0 aligncenter cellpadding0 cellspacing0> tr> td height1 colspan4>span classtitle>Forensical Investigations /span>/td> /tr> tr> td height1 colspan4 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td width1680 colspan3>div alignright>em>span classheadersmall>Computer Forensics and Electronic Discovery/span>/em>/div>/td> /tr> tr> td colspan3>br> table width560 border0 cellspacing0 cellpadding0> tr> td height1 colspan3 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td width1 bgcolor#000000>img srcspacer.gif width1 height1>/td> td>table width558 border0 aligncenter cellpadding0 cellspacing0 bgcolor#FFFFFF> tr> th colspan2 classheader scoperow>table aligncenter cellpadding10> tr> td>div alignjustify>Forensical Investigations provides expertise in the area of computer forensics to our clients. We utilize trained and certified examiners with extensive experience in computer and network technology. /div> p alignjustify>There is a growing need for computer analysts who follow sound forensic methodologies which include preservation of evidence and chain of custody. This provides assurance that the original media and data are maintained in their original unaltered state during the investigation./p> p alignjustify>We strictly follow the a hrefhttp://www.forensical.com/ethics.htm target_blank>code of ethics/a> established by the International Association of Computer Investigative Specialists (a hrefhttp://www.cops.org target_blank>IACIS/a>) which allows us to prepare cases in a manner that is acceptable in a court of law. This results in the evidence speaking for itself and accurately depicting the facts involved./p> p alignjustify>Investigations are done thoroughly, properly prepared, then documented and verified. Documentation of procedures used and evidence found is especially important. Recovery of evidence is crucial and a complete examination including erased or hidden evidence is a key focus of our examinations./p> p alignjustify>We are primarily able to assist in cases of employee use of computers to commit fraud, abuse, removal of proprietary information or alleged violations of company policies./p>/td> /tr> /table>/th> /tr> /table>/td> td width1 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td height1 colspan3 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td colspan2> /td> /tr> tr> td height1 colspan3 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td width1680 colspan3>div aligncenter classheadersmall>PO Box 7236, Northridge, CA 91327 - Tel: 818.494.5556 - E-mail: script typetext/javascript>eval(unescape(d%6fc%75%6de%6e%74%2e%77%72%69%74e%28%27%3Ca%20%68%72ef%3D%22%26%23109%3Ba%26%23105%3B%6c%26%23116%3B%26%23111%3B%3A%26%23105%3B%26%23110%3B%26%23102%3B%26%23111%3B%26%2364%3B%26%23102%3B%26%23111%3B%26%23114%3B%26%23101%3B%26%23110%3B%26%23115%3B%26%23105%3B%26%2399%3B%26%2397%3B%26%23108%3B%26%2346%3B%26%2399%3B%26%23111%3B%26%23109%3B%22%3E%69%6ef%6f%40f%6f%72e%6e%73%69ca%6c%2ec%6f%6d%3C%2fa%3E%27%29%3B));/script> /div>/td> /tr> /table>/td> /tr> /table>/td> /tr> /table> /div> /body>/html>
Port 443
HTTP/1.1 200 OKDate: Fri, 17 Jan 2025 02:42:50 GMTServer: ApacheUpgrade: h2,h2cConnection: UpgradeLast-Modified: Sun, 07 Jul 2013 01:23:45 GMTAccept-Ranges: bytesVary: Accept-EncodingTransfer-Encoding: chunkedContent-Type: text/html !DOCTYPE html PUBLIC -//W3C//DTD HTML 3.2//EN>html>head>title>Forensical Investigations - Computer Forensics and Electronic Discovery/title>meta http-equivContent-Type contenttext/html; charsetutf-8 />meta namerobots contentALL>meta namedistribution contentGlobal>meta namedescription contentForensical Investigations provides computer forensic and network security services for law firms, businesses and law enforcement agencies in Los Angeles.>meta namekeywords contentforensical, electronic evidence, data discovery, data restoration, evidence, computer forensics, expert witness, computer evidence consulting, computer risk management, computer fraud, computer security, computer generated evidence, computer crime consulting, computer crime investigation, computer discovery, computer forensic analysis, data recovery, data security discovery, digital evidence, digital legal discovery, digital media law discovery, e-mail discovery, e-mail evidence, e-mail crime, electronic discovery, electronic forensics, electronic legal discovery, electronic records fraud, electronic risk control, electronic document discovery, evidence recovery, evidence recovery consulting, electronic evidence, electronic evidence discovery, forensic analysis, forensic computer consultant, forensic, hidden data, hidden files, lost data, litigation data recovery, risk management, recovery technology, media recovery, los angeles, northridge, california, cyber,>style typetext/css>!--.header { font-family: Georgia, Times New Roman, Times, serif; font-size: 16px; font-weight: bold; color: 002889;}.default { font-family: Georgia, Times New Roman, Times, serif; font-size: 10px;}.headersmall { font-family: Georgia, Times New Roman, Times, serif; font-size: 12px; font-weight: bold; color: 002889;}.title { font-family: Georgia, Times New Roman, Times, serif; font-size: 16px; font-weight: bold; color: #333333;}--> /style>script src/google_analytics_auto.js>/script>/head>body bgcolor#DDDDDD text#000000 link#990033 vlink#990033 alink#990033 classdefault> div aligncenter> table width600 border0 cellpadding0 cellspacing0> tr> td>table width560 border0 aligncenter cellpadding0 cellspacing0> tr> td height1 colspan4>span classtitle>Forensical Investigations /span>/td> /tr> tr> td height1 colspan4 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td width1680 colspan3>div alignright>em>span classheadersmall>Computer Forensics and Electronic Discovery/span>/em>/div>/td> /tr> tr> td colspan3>br> table width560 border0 cellspacing0 cellpadding0> tr> td height1 colspan3 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td width1 bgcolor#000000>img srcspacer.gif width1 height1>/td> td>table width558 border0 aligncenter cellpadding0 cellspacing0 bgcolor#FFFFFF> tr> th colspan2 classheader scoperow>table aligncenter cellpadding10> tr> td>div alignjustify>Forensical Investigations provides expertise in the area of computer forensics to our clients. We utilize trained and certified examiners with extensive experience in computer and network technology. /div> p alignjustify>There is a growing need for computer analysts who follow sound forensic methodologies which include preservation of evidence and chain of custody. This provides assurance that the original media and data are maintained in their original unaltered state during the investigation./p> p alignjustify>We strictly follow the a hrefhttp://www.forensical.com/ethics.htm target_blank>code of ethics/a> established by the International Association of Computer Investigative Specialists (a hrefhttp://www.cops.org target_blank>IACIS/a>) which allows us to prepare cases in a manner that is acceptable in a court of law. This results in the evidence speaking for itself and accurately depicting the facts involved./p> p alignjustify>Investigations are done thoroughly, properly prepared, then documented and verified. Documentation of procedures used and evidence found is especially important. Recovery of evidence is crucial and a complete examination including erased or hidden evidence is a key focus of our examinations./p> p alignjustify>We are primarily able to assist in cases of employee use of computers to commit fraud, abuse, removal of proprietary information or alleged violations of company policies./p>/td> /tr> /table>/th> /tr> /table>/td> td width1 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td height1 colspan3 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td colspan2> /td> /tr> tr> td height1 colspan3 bgcolor#000000>img srcspacer.gif width1 height1>/td> /tr> tr> td width1680 colspan3>div aligncenter classheadersmall>PO Box 7236, Northridge, CA 91327 - Tel: 818.494.5556 - E-mail: script typetext/javascript>eval(unescape(d%6fc%75%6de%6e%74%2e%77%72%69%74e%28%27%3Ca%20%68%72ef%3D%22%26%23109%3Ba%26%23105%3B%6c%26%23116%3B%26%23111%3B%3A%26%23105%3B%26%23110%3B%26%23102%3B%26%23111%3B%26%2364%3B%26%23102%3B%26%23111%3B%26%23114%3B%26%23101%3B%26%23110%3B%26%23115%3B%26%23105%3B%26%2399%3B%26%2397%3B%26%23108%3B%26%2346%3B%26%2399%3B%26%23111%3B%26%23109%3B%22%3E%69%6ef%6f%40f%6f%72e%6e%73%69ca%6c%2ec%6f%6d%3C%2fa%3E%27%29%3B));/script> /div>/td> /tr> /table>/td> /tr> /table>/td> /tr> /table> /div> /body>/html>
View on OTX
|
View on ThreatMiner
Please enable JavaScript to view the
comments powered by Disqus.
Data with thanks to
AlienVault OTX
,
VirusTotal
,
Malwr
and
others
. [
Sitemap
]