From: "(�`�.�Craig Chilton�.���) www.LayoffRemedy.com>" on
In article <20091102214140.30B931A736C(a)www.ecn.org>
Anonymous <cripto(a)ecn.org> wrote:
>
> Michael Snyder <msnyder(a)sonic.net> wrote:
> >Anonymous Remailer (austria) wrote:
> >> i took a teenaged girl and brought her here to play with
> >>
> >> my idea was that people in the newsgroups would answer questions and would
> >> affect how i would play with her
> >>
> >> people decided to laugh and make fun of me instead so i decided to scrap
> >> the project which means there is now going to be a dead body
> >>
> >> what are some pointers to dispose of a body with absolutely no forensic
> >> evidence
> >>
> >> i want to place or bury her remains somewhere
> >>
> >> and then the people here who laughed at me will be told where they can go
> >> and collect their reward
> >>
> >> maybe next time they will take me more seriously
> >
> >You are an idiot and a troll.
>
> there is a ghost town known as rice, california
>
> i left a present there for you, about fifty feet from the old gas station,
> michael
>
> hurry before the sun or the coyotes get her

Okay! I found her and there was enough left over for me to
enjoy. Thanks a lot man. How much do I owe you?
























From: jonewoo on

Hi,
It's a detailed science. However, very broadly, the main phases are
sometimes considered to be: secure the subject system (from tampering
during the operation); take a copy of hard drive (if applicable);
identify and recovery all files (including those deleted); access/copy
hidden, protected and temporary files; study 'special' areas on the
drive (eg: residue from previously deleted files); investigate
data/settings from installed applications/programs; assess the system
as a whole, including its structure; consider general factors relating
to the users activity; create detailed report. Throughout the
investigation, it is important to stress that a full audit log of your
activities should be maintained.




--
jonewoo