{"id":66,"date":"2018-02-27T07:27:55","date_gmt":"2018-02-27T06:27:55","guid":{"rendered":"https:\/\/www.gr-itexperts.com.au\/?page_id=66"},"modified":"2018-02-27T07:27:55","modified_gmt":"2018-02-27T06:27:55","slug":"computer-forensic","status":"publish","type":"page","link":"https:\/\/www.gr-itexperts.com\/?page_id=66","title":{"rendered":"Computer Forensic"},"content":{"rendered":"<footer id=\"colophon\" class=\"site-footer\" role=\"contentinfo\">\n<div>Computer Forensic is the skill to extract evidence from computer media even if it is deleted.<\/div>\n<div class=\"site-info\">\n<p>We are able to<\/p>\n<ul>\n<li>analyze digital storage media<\/li>\n<li>perform forensic data copies<\/li>\n<li>evaluate findings<\/li>\n<li>finding breach of data privacy issues<\/li>\n<li>evidence about file sharing in general and incriminated data in detail<\/li>\n<li>data gathering when a simple forensic copy is not appropriate (i.w. when searching a large data storage)<\/li>\n<\/ul>\n<p>Our forensics specialist Mathias has worked in more than 500 cases on forensic issues.<\/p>\n<p>Please contact us for further information.<\/p>\n<\/div>\n<\/footer>\n","protected":false},"excerpt":{"rendered":"<p>Computer Forensic is the skill to extract evidence from computer media even if it is deleted. We are able to analyze digital storage media perform forensic data copies evaluate findings finding breach of data privacy issues evidence about file sharing in general and incriminated data in detail data gathering when a simple forensic copy is [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":11,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-66","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=\/wp\/v2\/pages\/66","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=66"}],"version-history":[{"count":0,"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=\/wp\/v2\/pages\/66\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=\/wp\/v2\/pages\/11"}],"wp:attachment":[{"href":"https:\/\/www.gr-itexperts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=66"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}