Six Steps to Prevent Desktop Fraud in AP

Accounts Payable need to be protected from spreadsheet frauds. Some of these frauds and spreadsheet errors would have been easily prevented should some basic controls and checking have been incorporated prior to implementation. The Recovery process for AP fraud can be pretty tedious especially in the procure-to-pay area where financial services are involved.



1) We should be aware by now that computer-centric fraud often shows that the person responsible for the fraud may be the very person who established the system or spreadsheet and is controlling its operations and modifications. Periodic Internal audits needs to be carried out on Accounting data/spreadsheets/logic to ensure no hanky-panky actions behind the screen.



2) Segregation of duties is the fundamental concept of internal control to reduce and avoid frauds in companies. Unfortunately, most of the companies have failed to pinpoint this gap, by having the same person assigned with full responsibility in terms of spreadsheets control or modification within the disbursement process



3) Untested spreadsheets and desktop applications with design flaws often result in miscalculations, mechanical and/or logic errors, lack of audit trails, balancing and reconciliation anomalies.



4) Everyone need to support the desktop spreadsheet/application with a written desk procedures. This is one of the key item of internal control. Many times, written procedure on this have been found to be incomplete and vague. Internal control and close surveillance need to be enforced here.



5) Companies should utilize their existing desktop AP spreadsheet and applications to strengthen their internal controls. Excel and Access are two good applications to start with. Verifications can be carried out using data management tasks with essential statistical and analytical tests to identify possible fraud. Top management should ensure that a more formal and structured top-down approach is taken effect for all functional areas in the company, especially the Accounting field.



6) To furbish detail written procedures and policies for any new applications by addressing their layout, documentation, internal controls, testing, modification, security, and staff activities. Once these are ready, these written black and white need to be ready to incorporate in all new desktop applications.



Prior to any new implementation, these actions are necessary,



-Independent application/spreadsheet assessments need to be audit thoroughly
-Necessary internal controls, security, data integrity process need to be established in written procedures
-Close out all the identified deficiencies by validating their necessary proposed corrective actions. And ensuring that these are properly carried out for close-loop.
-Equally important is the monitoring work such as : periodic check on desktop spreadsheets /applications integrity, initiate reviews and assessments from time to time are good check-points to start with.




For more information about computer forensics careers and online computer forensics degree, visit ComputerForensicsBasics.com.

The Use of Digital Forensics For a Private Investigator

Digital Forensics is referred to as computer forensic analysis, electronic evidence discovery, digital discovery, computer analysis, and computer examinations. It is the process of preservation, identification, interpretation and documentation of evidence recovered for presentation in civil or criminal court.



Digital Forensic helps recovering deleted files and searching the slack and unallocated space on the hard drive, places where valuable hard to find evidence regularly resides. It traced on windows artifacts, for clues of what the computer has been used for, and, more importantly, knowing how to find the artifacts, and evaluating the value of information. Processing of hidden files that contain past usage information.



Professionally trained forensic technicians can recover data from a hard drive, floppy disk,USB keys, CF cards or SD cards, smart phone or cell telephone or flash card memory stick, data recovery can be done with digital forensic solution using the latest technology to recover your data. Electronic digital evidence acquisition, search, filter and consolidation of data, e-mail's and files from virtually any type of media including hard drives, backup tapes, CD-ROM, floppy disks, Zip disks.



Computer forensics is capable to run the string-search for e-mail with an analysis revealing the Internet usage, recover data, and accomplish a full analysis even after the computer has been defragged and/or formatted.



Here are some examples on how Digital forensics provide assistance to private investigator in specific tasks and scenarios:



1. Adultery cases : where the forensic recovery was used to find evidence/trail of an unfaithful husband
Tailing the suspect : by using GPS (Global Positioning System).



Evidende Acquisition : Deleted mails, erased SMS Text messages, cell phone messages archives and others.



2. Harassment cases: victim receiving of harassment via phone, and/or email.



Tailing the suspect : Preserve logs of phone calls received from cell phones or email sent from a given source and present them as evidence by strictly maintaining a chain of custody. The forensic examiner can analyze the email header and trace it for the origins of the IP address from which it has been sent.



3. Surveillance cases : continual observation of a person closely in suspection of doing something illegal



Tailing the suspect : modern devices such as spy-ware programs and keystroke loggers are able to capture and provide real time information about what, where and when things have occurred on a suspected computer.



As society and economy evolved, the competitiveness in private investigation field gets intense. Therefore, it is vital to always stay with the latest modern technology with its latest devices, in order to provide the best professional and valued services to their clients. The ability of private investigator to equip with certain knowledge and skill on digital Forensics is a great essential step not only to further enhance the stability of this professional service, but to monopoly this business as well.




For more information about computer forensics careers and online computer forensics degree, visit ComputerForensicsBasics.com.

The Limitations of HTTP With Anonymous Browsing

HTTP is a set of rules requesting pages from a web server and transmitting pages (including text, graphic images, sound, video, and other multimedia files) to the requesting Web browser. HTTP uses TCP 'port 80' . HTTP proxies can be used by Internet users to "hide" their online identity by hiding their IP (Internet Protocol) address. This might be due to the fact that some employers tend to audit what their employees have been surfing during their office hours. Indirectly, increasing users have turned to HTTP proxies to protect their anonymity for their web-surfing habits.



HTTP proxies allow users to surf the web anonymously. The user can visit any website they wish under the disguise of an anonymous IP address. HTTP also have the added benefit of typically being compatible with any kind of browser the user wishes to utilize on.



On the negative end, HTTP proxies are not always secure as they are lack of security features and often left open. Open HTTP proxies can expose the user to even more risks In terms of piracy and frauds.



Apart from that, HTTP is a text based protocol, with all its communication pretty much readable, with no decoding, translation or decryption required. However, it is unbelievable to find that although it is advisable to encrypt to protect one's identities, HTTP, being one of the most common used mode of transport for personal information operates almost entirely in clear text. Guess that's because HTTP protocol was created without security in mind, but for a quick exchange of information as the key objective.



In fact HTTP can be implemented on any available TCP port but unfortunately it has become a norm to use port 80 as the standard port. Every web browser tries to connect on that port so every web server will listed on that port, there are of course always exceptions like SSL but it is guaranteed one of the first rules a firewall administrator will put in his rule base it's going to be 'allow TCP 80'.




For more information about computer forensics careers and online computer forensics degree, visit ComputerForensicsBasics.com.

Is it Secure to Use a Free Anonymous Web Proxy?

Free anonymous web surfing is one of the way to achieve anonymity on the internet. Computers get connected with ISP's in the normal way, but they are then routed through a special type of proxy server. These servers conceal or disguise a computer's IP address by channeling connections through alternative IP addresses. The basic challenge is that anonymity on the internet depends solely on trust. They can be set up by anyone, with or without qualifications or licenses required.



Some of these site may possibly be an ideal place to harvest sensitive financial and confidential information. Identity theft is normal these days thanks to the internet. It's of no exaggeration to say that we face risk where personal privacy is rapidly disappearing.



Anonymous web surfing sites only offer support for web browsing and not other services such as IRC or ICQ. Typically they don't secure their sites using SSL or SSH encryption. However,this does not necessarily concern all users of free anonymous web surfing sites especially for those whom does not expose their personal information or identity, such as students to surf anonymously for school work. The risks will only increase dramatically when an anonymous web site is used for banking, on-line shopping, buying and selling or auctioning online.



Nevertheless, web surfers need to be aware that for a connection to be both anonymous and secure, it must be encrypted all the way through from a computer to its destination using either SSL or SSH encryption. Thorough considerations and checking need to be weighed before selecting a service, irrespective of whether it's a free anonymous web surfing site or commercial. For these reasons it's essential to perform thorough investigation before putting any trust in an anonymous proxy service. Anonymous proxies can provide a great laptop security, but it's essential to use a service with an established reputation above all means.




For more information about computer forensics careers and online computer forensics degree, visit ComputerForensicsBasics.com.

Is it Possible For Your Computer to Be Infected by a Virus Without You Knowing it?

Under some circumstances, one may have his/her computer infected with virus without knowing it, especially if the virus is FUD (FULLY undetectable), then it simply means that no anti-virus can detect it.



However, the good news is that viruses can't stay FUD for long.



There is no single anti-virus program which is designed to eliminate all types of viruses that have been ever made. As Anti-virus is always one step behind virus, it is of no surprise that any new Anti-Virus program is developed only after a new Virus is found. However, as pre-caution, please frequently check your anti-virus program to make sure it is working as the latest virus may disable your anti-virus program without you knowing it!



Here are some clues to look out for, clues if your computer might get hijacked
- your computer is having frequent periods of prolonged slowdowns
- your search results come back all wrong
- you get sent to websites you had no intention of visiting
- you start to receive mails accusing you of sending spams; you find email messages in your "outbox" that you didn't send



To avoid your computer from being virus infected easily, here's what you can do,
- Make sure you always have the latest anti-virus software installed on your computer.
- Try a remote service which can scam your computer and remove the virus with a fee
- Immediately reinstall your operating system if you sense unusual performance on your PC
- Don't open unknown mails especially with attachment files.
- Use a firewall to protect your computer from hacking attacks while it is connected to the Internet. A properly configured firewall makes it tougher for hackers to locate your computer and get into your system.
- MS Wndows (XP and Vista) has a software firewall built-in which you need to turn on. If your operating system doesn't include any firewall, you can install a separate firewall software that runs in the background while you use your computer to surf the Internet.
- Most routers (like Dlink, Linksys, Netgear) have their hardware firewalls built-in. A hardware firewall is an external device that includes firewall software. Like anti-virus software, any particular firewall software needs to be upgraded regularly to stay effective.



If your computer is affected by computer viruses,
- Immediately disconnect from the Internet (Unplug the cable connecting you to the DSL router, and the cable modem)
- Then scan your entire computer with fully latest updated anti-virus software
- Report any unauthorized access that the anti-virus software finds to your ISP.
-If you suspect that any of your passwords have been compromised, directly call up the site's company immediately and change your password on the spot.
- As you can't delete a virus from the infected computer. You need to get an adapter and a USB cord to run the Anti-Virus on another computer.




For more information about computer forensics careers and online computer forensics degree, visit ComputerForensicsBasics.com.

How to Get a Place in Top Computer Forensics Schools

Computer forensics is a constantly growing field that appeals to many people today. As many companies and businesses require employees who are knowledgeable in this particular field, more and more universities and education centers offer computer forensics certifications and accredited courses.



There are numerous top computer forensics schools and universities that would do you good to graduate from and promise you a bright future ahead. Such schools are:


  • The American Intercontinental University

  • The Virginia College

  • The Capella University

  • The University of Phoenix

  • The Kaplan University

  • The Virginia College



These education centers are high in ranking and require a lot of hard work to get into. Nevertheless, it would be worth it as they give you great opportunities to have potential careers. How do you get a place in top schools?


  • Have a solid foundation in computers, systems, architecture, law and storage media. You don't need in depth knowledge, just the basics.

  • Gain some experience. Best way to do this is through internships and participating in short term projects as you can learn quite a lot.

  • It would be better if you have experience working in an environment where information security is a major issue. Such places would be Banks, security firms and etc.

  • You'd definitely need to be tech savvy. Keep up with technology improvements and be up-to-date.

  • Most of all, you'd need the passion and interest in technology, fraud, banking, money laundering, so on and so forth.

  • Also, you'd need to be good in analyzing and extracting information. This would require a lot of patience and quick thinking.



With these skills, passion and dedication you should be able to land yourself into a good, well known school and gain accredited degrees. Just don't give up and work hard!




For more information about computer forensics schools and computer forensics certificate program, visit ComputerForensicsBasics.com.

How to Get Yourself a Computer Forensics Certification at Home

As technology advances, more and more companies use computers to store documents and transfer information. With this, online crime rates increase rapidly causing disruptions to the companies and putting them at risk. Hence, computer forensics is a must among employers of companies that want to do well.



There are numerous ways to get yourself a computer forensics certification. Since most people pick this up at a part time job, you can obtain your certification at home as a sideline to your stable job. How do you do that? First thing first, get yourself enrolled into an accredited course.



There are many universities and computer forensics schools that offer online computer forensics certificate programs; grab the opportunity by picking the specific area you want to master in and enroll yourself.



  • Once you're registered to study this subject, search for program that offers the Certified Information Systems Security Professional (CISSP) training. This is one of the most recognized papers because it has high passing conditions. These would be:

    • To pass the paper with a score greater than 700

    • To posses at least 5 years of direct security working experience

    • To efficiently answer 4 questions based on family background and criminal history



  • Land yourself a Certified Electronic Evidence Collection Specialist (CEECS) Certification and do the following intensive courses and study to become a Certified Forensic Computer examiner. With this, recruiters wouldn't hesitate to hire you into their firm as you would be a valuable employer


  • Next, work on the Qualified Forensics Expert certificate. This comes with more in-depth classes as it gives you a wider horizon on computer forensics. With this, you would be able to find the cause of attacks, hacks, breakdowns and trace crime activities.



Computer forensics is a skill that is high on demand in times of today. If you have the interest and patience, head and get started on earning your certificates; they will take you a long way and you wouldn't regret it.




For more information about computer forensics certification and computer forensic schools, visit ComputerForensicsBasics.com.