Your browser doesn't support the features required for this presentation, so you are presented with a simplified version.
For the best experience please use the latest Chrome, Safari or Firefox browser.

Forensics: historical
Who accessed what and how?
Often circumventing security
Use a spacebar or arrow keys to navigate