<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computer Forensics Articles</title>
	<atom:link href="https://datarecovery.com/category/services/computer-forensics-services/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Mon, 06 Nov 2023 22:58:13 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>Data Recovery and Computer Forensics: What’s The Difference?</title>
		<link>https://datarecovery.com/rd/data-recovery-and-computer-forensics-whats-the-difference/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Mon, 06 Nov 2023 22:58:13 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Data Recovery Knowledge]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=7732</guid>

					<description><![CDATA[<p>In our industry, “data recovery&#8221; refers to the process of restoring data that has been corrupted, deleted, or made inaccessible for another reason (such as a media failure). <br />
“Computer forensics&#8221; is related, but different: Forensics attempts to determine what happened...</p>
<p>The post <a href="https://datarecovery.com/rd/data-recovery-and-computer-forensics-whats-the-difference/">Data Recovery and Computer Forensics: What’s The Difference?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;"><img decoding="async" class="size-medium wp-image-6805 alignright" src="https://datarecovery.com/wp-content/uploads/2021/10/IMG_3084_758x575-300x228.jpg" alt="Hard drive actuator assembly and other internals" width="300" height="228" srcset="https://datarecovery.com/wp-content/uploads/2021/10/IMG_3084_758x575-300x228.jpg 300w, https://datarecovery.com/wp-content/uploads/2021/10/IMG_3084_758x575.jpg 758w" sizes="(max-width: 300px) 100vw, 300px" />In our industry, “data recovery&#8221; refers to the process of restoring data that has been corrupted, deleted, or made inaccessible for another reason (such as a media failure). </span></p>
<p><span style="font-weight: 400;">“Computer forensics&#8221; is related, but different: Forensics attempts to determine </span><i><span style="font-weight: 400;">what happened </span></i><span style="font-weight: 400;">to the data. Typically, the goal of computer forensics is to present evidence in court. </span></p>
<p><span style="font-weight: 400;">Sometimes, the two fields overlap. For example, if you’ve deleted a file and need it back, you need data recovery services. If an angry employee deleted the file, you may still need data recovery — but you may also wish to file a lawsuit or press charges against the employee for intentionally destroying the data. In that case, you’ll need computer forensics services. </span></p>
<h2><span style="font-weight: 400;">Do I need data recovery services or computer forensics?</span></h2>
<p><span style="font-weight: 400;">If you intend to use restored data as evidence in a court of law — or if there’s even a </span><i><span style="font-weight: 400;">slight chance </span></i><span style="font-weight: 400;">that you may do so — you need computer forensics services. </span></p>
<p><span style="font-weight: 400;">It’s in your best interest to tell data recovery engineers about this possibility as early as possible. Here’s why:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Computer forensics engineers maintain a chain of custody (a report that shows how media was handled, who handled the media, and other key details). Without a complete chain of custody report, you may not be able to demonstrate the integrity of your evidence.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Computer forensics requires a distinct set of tools. Forensic engineers will need to use the appropriate tools to find key information (such as when a file was edited or opened, which users edited the file, and so on).</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If the target data is potentially illegal, appropriate engineers will need to be assigned to the case. Appropriate precautions will need to be taken to handle the data in an ethical, legal manner.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Precautions will also need to be taken to protect the evidence while it remains in the engineer’s custody. Without those precautions, the evidence may not be admissible in court. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Forensic engineers can provide an accurate timeline for the case. This can be essential information for your legal team.</span><span style="font-weight: 400;"><br />
</span></li>
</ul>
<p><span style="font-weight: 400;">Because it requires extensive specialization, computer forensics is usually more expensive than standard data recovery. However, if you need to present information as evidence, you need forensics and eDiscovery services — standard data recovery is not an option. </span></p>
<p><span style="font-weight: 400;">Related: </span><a href="https://datarecovery.com/rd/computer-forensics-what-is-it-and-how-is-it-used/"><span style="font-weight: 400;">Computer Forensics: What Is It, and How Is It Used?</span></a></p>
<h3><span style="font-weight: 400;">Researching Computer Forensics Providers: Key Questions</span></h3>
<p><span style="font-weight: 400;">When researching computer forensics, we recommend asking questions:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Does the forensic specialist use industry-standard tools and software? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Does the forensic specialist have relevant experience, and have they ever testified in court? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">If the company uses proprietary software for forensics and discovery, has the software been accepted by courts as admissible? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Does the firm have appropriate outfitting for performing data recovery services when necessary, including certified cleanrooms and firmware repair tools? </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Does the firm have appropriate controls for maintaining privacy/security compliance when handling the data?</span></li>
</ul>
<h2><span style="font-weight: 400;">Computer Forensics and Data Recovery Services from Datarecovery.com</span></h2>
<p><span style="font-weight: 400;">Datarecovery.com maintains full-service laboratories at each of our listed locations. Whether you need data recovery, computer forensics, data sanitization, or other related services, we’re dedicated to providing expert resources to meet your needs. </span></p>
<p><span style="font-weight: 400;">To learn more about our data recovery and forensic services, </span><a href="https://datarecovery.com/submit.php"><span style="font-weight: 400;">schedule a risk-free evaluation online</span></a><span style="font-weight: 400;"> or call 1-800-237-4200 to speak with a specialist.</span></p>
<p>The post <a href="https://datarecovery.com/rd/data-recovery-and-computer-forensics-whats-the-difference/">Data Recovery and Computer Forensics: What’s The Difference?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Data Leak Response: 4 Tactics for Reducing Risks</title>
		<link>https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/</link>
					<comments>https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 21 Mar 2022 21:19:27 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Network Security]]></category>
		<category><![CDATA[Services]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=7057</guid>

					<description><![CDATA[<p>According to the Identity Theft Resource Center, the number of data breaches jumped <a href="https://www.idtheftcenter.org/post/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises/">68 percent</a> in 2021 — setting a new record with a total of 1,862 events.<br />
To IT security experts, the numbers aren’t surprising. Bad actors use extremely...</p>
<p>The post <a href="https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/">Data Leak Response: 4 Tactics for Reducing Risks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignnone size-large wp-image-4348" src="https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500-1024x500.jpg" alt="security pointer icon" width="1024" height="500" srcset="https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500.jpg 1024w, https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500-300x146.jpg 300w, https://datarecovery.com/wp-content/uploads/2015/09/security-265130_1024x500-768x375.jpg 768w" sizes="auto, (max-width: 1024px) 100vw, 1024px" /></p>
<p>According to the Identity Theft Resource Center, the number of data breaches jumped <a href="https://www.idtheftcenter.org/post/identity-theft-resource-center-2021-annual-data-breach-report-sets-new-record-for-number-of-compromises/">68 percent</a> in 2021 — setting a new record with a total of 1,862 events.</p>
<p>To IT security experts, the numbers aren’t surprising. Bad actors use extremely sophisticated methods to target sensitive data, and malicious attacks have become a prominent concern over the past several years for both government and private entities.</p>
<p>In order to respond to a data leak, organizations should start with a careful assessment of the leaked data and the attack vectors that compromised your system. Here’s a quick guide.</p>
<h2>1. Audit to determine the extent of the data leak.</h2>
<p>When data breaches occur, it’s imperative to identify whether personally identifiable information (PII) was compromised — and if so, to what extent.</p>
<p>Some breaches don’t expose PII to bad actors, but unfortunately, that’s not always the case. Stolen information often ends up on the dark web, available for purchase to identity thieves. Your data leak response plan should include a thorough audit of dark web resources to determine whether your company’s data is directly available. Auditing the breach can also identify the attack vectors used to compromise the data.</p>
<p><b>Regular audits are helpful even if your company hasn’t identified an active leak. </b>Unfortunately, the vast majority of companies do not detect data breaches until the leak has been identified by third-party sources (such as news reports or law enforcement notifications). According to a <a href="https://www.fireeye.com/content/dam/fireeye-www/current-threats/pdfs/rpt-mtrends-2016.pdf">report from Mandiant Consulting</a>, the average time between the initial data leak to discovery is about 146 days.</p>
<p>Datarecovery.com can help your organization identify breaches by using proprietary methods to search for data on the internet and the dark web. Contact our forensic experts at 1-800-237-4200 or <a href="https://datarecovery.com/submit.php">click here to request more information.</a></p>
<h2>2. Follow your state’s reporting laws for significant data breaches.</h2>
<p>All 50 states require entities to notify affected individuals of the unauthorized acquisition of PII. In most states, notifications must be sent within a reasonable time frame — usually 30-60 days.</p>
<p>Check your state’s <a href="https://www.itgovernanceusa.com/data-breach-notification-laws">data breach notification laws</a> after fully auditing your breach. Depending on the nature of the stolen data, you may face significant civil penalties for failing to report the issue.</p>
<h2>3. Create a data leak response plan.</h2>
<p>In addition to auditing and reporting the data breach, your organization will need to form a full response plan before returning to business as normal. Some quick tips for developing a strategy:</p>
<ul>
<li aria-level="1">Designate responsibilities and set clear goal outcomes. Include managers, technicians, business partners, your legal team, forensic experts, and any other individuals who will play a role in addressing the breach.</li>
<li aria-level="1">Identify the compromised systems and set a timeline for restoration of service.</li>
<li aria-level="1">Engage in penetration testing (or pen testing). Pen testing services attempt to infiltrate your system using common vectors of attack. Datarecovery.com offers pen testing with remediation guidance for enterprise-level systems.</li>
</ul>
<p><b>Don’t access the affected systems until you’ve fully audited the breach.</b> To ensure an accurate forensic analysis, do not turn the systems off or attempt to address the issue without expert guidance.</p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-6644 size-medium" src="https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-300x218.png" alt="cyber security word cloud" width="300" height="218" srcset="https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-300x218.png 300w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-1024x744.png 1024w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280-768x558.png 768w, https://datarecovery.com/wp-content/uploads/2021/07/cyber-security-1805632_1280.png 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<h2>4. Work with forensic experts from day one.</h2>
<p>Data breaches can harm your brand, and responding to a leak can be expensive. Forensic experts can help you control the price of the project by accurately identifying weaknesses in your security controls and protocols.</p>
<p>Datarecovery.com offers essential resources for finding leaks, improving storage redundancy, and creating long-term strategies for security maintenance and disaster recovery. We work closely with your team to ensure that the threat is accurately identified, contained, and addressed — improving business outcomes and reducing your future risks.</p>
<p><b>From data leak monitoring to threat identification and penetration testing, Datarecovery.com can help your organization form a response plan. Learn more by contacting our team at 1-800-237-4200.</b></p>
<p>The post <a href="https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/">Data Leak Response: 4 Tactics for Reducing Risks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2022/03/data-leak-response-4-tactics-for-reducing-risks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Computer Forensics: What Is It, and How Is It Used?</title>
		<link>https://datarecovery.com/rd/computer-forensics-what-is-it-and-how-is-it-used/</link>
					<comments>https://datarecovery.com/rd/computer-forensics-what-is-it-and-how-is-it-used/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Tue, 30 Mar 2021 19:07:03 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Services]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?p=6511</guid>

					<description><![CDATA[<p>A phrase like “computer forensics” might sound like something you’d hear tossed around on an episode of Law &#38; Order: SVU or a rerun of Criminal Minds, but this is no made-for-TV thing: Computer forensics is a legitimate industry with...</p>
<p>The post <a href="https://datarecovery.com/rd/computer-forensics-what-is-it-and-how-is-it-used/">Computer Forensics: What Is It, and How Is It Used?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A phrase like “computer forensics” might sound like something you’d hear tossed around on an episode of <i>Law &amp; Order: SVU </i>or a rerun of <i>Criminal Minds</i>, but this is no made-for-TV thing: Computer forensics is a legitimate industry with legitimate real-world uses. Even more surprising is the fact that computer forensics is nothing new — it’s a science that dates back all the way to the 1980s, perhaps even earlier.</p>
<p><img loading="lazy" decoding="async" class="wp-image-6514 size-medium alignright" src="https://datarecovery.com/wp-content/uploads/2021/03/fingerprint-digital-1280-300x169.jpg" alt="" width="300" height="169" srcset="https://datarecovery.com/wp-content/uploads/2021/03/fingerprint-digital-1280-300x169.jpg 300w, https://datarecovery.com/wp-content/uploads/2021/03/fingerprint-digital-1280-1024x576.jpg 1024w, https://datarecovery.com/wp-content/uploads/2021/03/fingerprint-digital-1280-768x432.jpg 768w, https://datarecovery.com/wp-content/uploads/2021/03/fingerprint-digital-1280.jpg 1280w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p>From its early beginnings in legal investigations to its contemporary uses across a whole slew of industries, computer forensics is a truly fascinating science worth exploring further.</p>
<h2>What Is Computer Forensics?</h2>
<p>Also known as computer forensic science or simply cyber forensics, computer forensics deals with the uncovering of evidence exclusively from digital sources. Whether it’s a hard drive, a digital camera, a cell phone, or the microphone on an Alexa, computer forensics allows investigators to scrutinize digital media like a detective would do at a real-life crime scene in search of anything that can be used to identify, recover, preserve, or analyze evidence.</p>
<p>That might sound pretty complex, so let’s put things in simpler terms: computer forensics is like a crime scene investigation, a police search, and a private investigation all rolled into one uniform science. It takes great skill and immense knowledge to yield effective results in the world of computer forensics, but when done correctly, the evidence found can make or break a case.</p>
<p>With that being said, computer forensics is not exclusive to criminal proceedings: often, computer forensics can be utilized during civil investigations, as well. From corporate audits to divorce cases to simply recovering important documents that may have been intentionally deleted or hidden, it appears that the computer forensics industry contains all sorts of multitudes.</p>
<h2>How Is Computer Forensics Used?</h2>
<p>It’s clearer now what this computer forensic science actually is and what the goals of computer forensics are, but how exactly can this process actually be admissible in courtroom proceedings or trusted as fact in other various scenarios?</p>
<p>When computer forensics experts first emerged on the scene in the mid-1980s, it almost goes without saying that the legitimacy of their science was doubted somewhat. The sheer scope of what computers were beginning to do could barely be comprehended, let alone using them to actually uncover virtual evidence for use in the real world. But, as computer crimes became more and more common as the ‘80s gave way to the ‘90s, it was obvious that computer forensics was not just legit, but an essential part of the investigative process from that point forward.</p>
<p>To understand how this came to be, it’s worth examining the actual process of computer forensics through these most commonly used techniques:</p>
<ul>
<li aria-level="1"><b>Steganography: </b>Believe it or not, steganography is the process of hiding key data within an image or file in an attempt to hide it in plain sight. Thus begins the computer forensics version of <i>Where’s Waldo</i>: the scientist then dives deep into the hash of the edited file in question and compares it to the hash of the original image or file to find the difference.</li>
</ul>
<ul>
<li aria-level="1"><b>Live analysis: </b>This technique requires the computer forensic scientist to enter a device through its operating system and use custom or pre-existing tools within the OS to find and extract evidence.</li>
</ul>
<ul>
<li aria-level="1"><b>Deleted file recovery: </b>This is exactly what it sounds like — investigative scientists, through the use of special software, reconstruct deleted files and data from the device’s physical discs. As it turns out, “deleted” doesn’t always mean gone forever.</li>
</ul>
<ul>
<li aria-level="1"><b>Stochastic forensics: </b>Through the investigation of stochastic — or randomly determined — properties on a device, computer forensic scientists can look at the device’s activity and determine which activities are missing key digital artifacts.</li>
</ul>
<ul>
<li aria-level="1"><b>Cross-drive analysis</b>: This technique, which is one of the newer forms of computer forensics, involves parsing through multiple hard drives and correlating the information found on each individual drive in search of any anomalies or inconsistencies.</li>
</ul>
<h2>Examples of Computer Forensics in the Real World</h2>
<p>It’s one thing to read about what computer forensics is and how it’s used, but it’s something else entirely to see examples of how computer forensics has been used in both high-profile investigations and real-world scenarios throughout the years. These examples are only a handful of the most notable — in reality, computer forensic science is constantly shifting and evolving to meet the ever-changing technological advances as they come.</p>
<h3>The Investigation of Dr. Conrad Murray Following the Death of Michael Jackson</h3>
<p>In the wake of music icon Michael Jackson’s surprising death in 2009, computer forensics helped to uncover digital evidence on the computer of the singer’s doctor, Conrad Murray, that documented the lethal doses of propofol administered to Jackson. Investigators were then able to use these documents in their case against Murray.</p>
<h3>The Gathering of Evidence for Divorce and Family Law Cases</h3>
<p>During custody battles and divorce proceedings, many find that computer forensics yields useful results through the uncovering of key financial information and troubling social media posts. Computer forensic scientists have successfully found important tax and property documents that go on to change the course of these kinds of cases.</p>
<h3>The Use of Computer Forensics in Corporate Espionage</h3>
<p>It’s not uncommon to find corporations and industries who utilize computer forensics to uncover information from their professional rivals in hopes of gaining the upper hand. Whether it’s used to get insight on a competitor’s upcoming projects or products in an attempt to join the competition or simply to know what’s going on behind the rival’s closed doors, corporate espionage relies on computer forensics to get the job done.</p>
<p>With only a few decades under its belt, you can bet computer forensics will continue to impact our daily lives for centuries to come. Wherever the industry goes in the coming years, it’s sure to be just as revolutionary as the years that have preceded today. With each new technological revolution, a similar revolution in computer forensics is destined to follow.</p>
<p>The post <a href="https://datarecovery.com/rd/computer-forensics-what-is-it-and-how-is-it-used/">Computer Forensics: What Is It, and How Is It Used?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/rd/computer-forensics-what-is-it-and-how-is-it-used/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>The Ashley Madison Leak: What Information Was Released?</title>
		<link>https://datarecovery.com/rd/the-ashley-madison-leak-what-information-was-released/</link>
		
		<dc:creator><![CDATA[Ben Carmitchel]]></dc:creator>
		<pubDate>Thu, 27 Aug 2015 20:05:13 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Database]]></category>
		<category><![CDATA[leak]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=4290</guid>

					<description><![CDATA[<p>The Ashley Madison data leak is unquestionably the most high-profile IT security event of the last year, and members of the website face serious repercussions. Ashley Madison advertises as “the world’s leading married dating service for discreet encounters,” but that...</p>
<p>The post <a href="https://datarecovery.com/rd/the-ashley-madison-leak-what-information-was-released/">The Ashley Madison Leak: What Information Was Released?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">The Ashley Madison data leak is unquestionably the most high-profile IT security event of the last year, and members of the website face serious repercussions. Ashley Madison advertises as “the world’s leading married dating service for discreet encounters,” but that discretion was compromised as hackers released about 30 gigabytes of user data, including email addresses, names, and even GPS coordinates (likely collected from mobile users). </span></p>
<p><span style="font-weight: 400;">The leaked information came from a MySQL database, and many of the fields are fairly self-explanatory. “eye_color,” for instance, gives the user’s eye color (as input by the user when signing up for an Ashley Madison profile). For many accounts, some fields are left blank.</span></p>
<p><span style="font-weight: 400;">Credit card information is stored in a separate area, and most hackers will not be able to definitively link usernames with payment information. Furthermore, the leak did not contain complete credit card numbers, so payment information should be safe; even so, we would advise Ashley Madison users to contact their card providers and request a re-issued credit or debit card.</span></p>
<p>The Ashley Madison database contains the following fields—</p>
<p>Table: <strong>aminno_member_email</strong></p>
<table dir="ltr" style="width: 600px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;Field&quot;]"><strong>Field</strong></td>
<td data-sheets-value="[null,2,&quot;Description&quot;]"><strong>Description</strong></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pnum&quot;]">pnum</td>
<td data-sheets-value="[null,2,&quot;The record's primary key. &quot;]">The record&#8217;s primary key.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;email&quot;]">email</td>
<td data-sheets-value="[null,2,&quot;The account email address.&quot;]">The account email address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;isvalid&quot;]">isvalid</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;html&quot;]">html</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;optin&quot;]">optin</td>
<td data-sheets-value="[null,2,&quot;Whether or not the user opts in to the Ashley Madison newsletter. &quot;]">Whether or not the user opts in to the Ashley Madison newsletter.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_newmail&quot;]">notify_newmail</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_newmember&quot;]">notify_newmember</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_login&quot;]">notify_login</td>
<td></td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify_offer&quot;]">notify_offer</td>
<td></td>
</tr>
</tbody>
</table>
<p>Table: <strong>member_details</strong></p>
<table dir="ltr" style="width: 600px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;pnum&quot;]">pnum</td>
<td data-sheets-value="[null,2,&quot;The record's primary key. &quot;]">The record&#8217;s primary key.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;eye_color&quot;]">eye_color</td>
<td data-sheets-value="[null,2,&quot;User's eye color. &quot;]">User&#8217;s eye color.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;hair_color&quot;]">hair_color</td>
<td data-sheets-value="[null,2,&quot;User's hair color. &quot;]">User&#8217;s hair color.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;dob&quot;]">dob</td>
<td data-sheets-value="[null,2,&quot;User's date of birth. &quot;]">User&#8217;s date of birth.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_caption&quot;]">profile_caption</td>
<td data-sheets-value="[null,2,&quot;User-generated caption, visible on account profile. &quot;]">User-generated caption, visible on account profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_ethnicity&quot;]">profile_ethnicity</td>
<td data-sheets-value="[null,2,&quot;User's self-identified ethnicity, expressed as a number. &quot;]">User&#8217;s self-identified ethnicity, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_weight&quot;]">profile_weight</td>
<td data-sheets-value="[null,2,&quot;User's weight, visible on profile. &quot;]">User&#8217;s weight, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_height&quot;]">profile_height</td>
<td data-sheets-value="[null,2,&quot;User's height, visible on profile. &quot;]">User&#8217;s height, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_bodytype&quot;]">profile_bodytype</td>
<td data-sheets-value="[null,2,&quot;User's body type, expressed as a number.  &quot;]">User&#8217;s body type, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_smoke&quot;]">profile_smoke</td>
<td data-sheets-value="[null,2,&quot;Whether or not the user smokes. Visible on profile. &quot;]">Whether or not the user smokes. Visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_drink&quot;]">profile_drink</td>
<td data-sheets-value="[null,2,&quot;User's drinking status. Visible on profile. &quot;]">User&#8217;s drinking status. Visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_initially_seeking&quot;]">profile_initially_seeking</td>
<td data-sheets-value="[null,2,&quot;Type of relationship user is initially seeking, visible on profile. &quot;]">Type of relationship user is initially seeking, visible on profile.</td>
</tr>
</tbody>
</table>
<p>Table: <strong>member_login</strong></p>
<table dir="ltr" style="width: 600px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;pnum&quot;]">pnum</td>
<td data-sheets-value="[null,2,&quot;The record's primary key. &quot;]">The record&#8217;s primary key.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;username&quot;]">username</td>
<td data-sheets-value="[null,2,&quot;User's username. &quot;]">User&#8217;s username.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;password&quot;]">password</td>
<td data-sheets-value="[null,2,&quot;User's password (these are mostly protected with bcrypt).&quot;]">User&#8217;s password (these are encrypted).</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;loginkey&quot;]">loginkey</td>
<td data-sheets-value="[null,2,&quot;Login keys are unique to each user, authenticating the user for logout.&quot;]">Login keys are unique to each user, authenticating the user for logout.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;notify&quot;]">notify</td>
<td></td>
</tr>
</tbody>
</table>
<p>Table: <strong>am_am_member</strong></p>
<table dir="ltr" style="width: 800px;" border="1" cellspacing="0" cellpadding="0">
<colgroup>
<col width="157" />
<col width="404" /></colgroup>
<tbody>
<tr>
<td data-sheets-value="[null,2,&quot;id&quot;]">id</td>
<td data-sheets-value="[null,2,&quot;User id number. &quot;]">User id number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;createdon&quot;]">createdon</td>
<td data-sheets-value="[null,2,&quot;Date and time the account was created. &quot;]">Date and time the account was created.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;createdby&quot;]">createdby</td>
<td data-sheets-value="[null,2,&quot;User who created the account. &quot;]">User who created the account.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;updatedon&quot;]">updatedon</td>
<td data-sheets-value="[null,2,&quot;Date and time (to second) the account was last updated. &quot;]">Date and time (to second) the account was last updated.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;updatedby&quot;]">updatedby</td>
<td data-sheets-value="[null,2,&quot;User who updated the account. &quot;]">User who updated the account.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;admin&quot;]">admin</td>
<td data-sheets-value="[null,2,&quot;Whether or not the user has administrative status in the system. &quot;]">Whether or not the user has administrative status in the system.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;status&quot;]">status</td>
<td data-sheets-value="[null,2,&quot;User's relationship status. &quot;]">User&#8217;s relationship status.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;account_type&quot;]">account_type</td>
<td data-sheets-value="[null,2,&quot;Type of account. &quot;]">Type of account.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;membership_status&quot;]">membership_status</td>
<td data-sheets-value="[null,2,&quot;User's membership status. &quot;]">User&#8217;s membership status.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;ad_source&quot;]">ad_source</td>
<td data-sheets-value="[null,2,&quot;Tracks site advertising. &quot;]">Tracks site advertising.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_number&quot;]">profile_number</td>
<td data-sheets-value="[null,2,&quot;User's profile number. &quot;]">User&#8217;s profile number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;nickname&quot;]">nickname</td>
<td data-sheets-value="[null,2,&quot;User's nickname. &quot;]">User&#8217;s nickname.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;first_name&quot;]">first_name</td>
<td data-sheets-value="[null,2,&quot;User's first name&quot;]">User&#8217;s first name</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;last_name&quot;]">last_name</td>
<td data-sheets-value="[null,2,&quot;User's last name. &quot;]">User&#8217;s last name.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;street1&quot;]">street1</td>
<td data-sheets-value="[null,2,&quot;User's street address. &quot;]">User&#8217;s street address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;street2&quot;]">street2</td>
<td data-sheets-value="[null,2,&quot;Second line of user's street address (if applicable). &quot;]">Second line of user&#8217;s street address (if applicable).</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;city&quot;]">city</td>
<td data-sheets-value="[null,2,&quot;City listed in user's address. &quot;]">City listed in user&#8217;s address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;zip&quot;]">zip</td>
<td data-sheets-value="[null,2,&quot;Zipcode listed in user's address. &quot;]">Zipcode listed in user&#8217;s address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;state&quot;]">state</td>
<td data-sheets-value="[null,2,&quot;State listed in user's address. &quot;]">State listed in user&#8217;s address.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;latitude&quot;]">latitude</td>
<td data-sheets-value="[null,2,&quot;User's location latitude. &quot;]">User&#8217;s location latitude.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;longitude&quot;]">longitude</td>
<td data-sheets-value="[null,2,&quot;Longitude of user's location. &quot;]">Longitude of user&#8217;s location.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;country&quot;]">country</td>
<td data-sheets-value="[null,2,&quot;User's country of residence. &quot;]">User&#8217;s country of residence.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;phone&quot;]">phone</td>
<td data-sheets-value="[null,2,&quot;User's primary phone number. &quot;]">User&#8217;s primary phone number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;work_phone&quot;]">work_phone</td>
<td data-sheets-value="[null,2,&quot;User's work phone number .&quot;]">User&#8217;s work phone number .</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;mobile_phone&quot;]">mobile_phone</td>
<td data-sheets-value="[null,2,&quot;User's mobile phone number. &quot;]">User&#8217;s mobile phone number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;gender&quot;]">gender</td>
<td data-sheets-value="[null,2,&quot;User's gender. &quot;]">User&#8217;s gender.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;dob&quot;]">dob</td>
<td data-sheets-value="[null,2,&quot;User's date of birth. &quot;]">User&#8217;s date of birth.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_caption&quot;]">profile_caption</td>
<td data-sheets-value="[null,2,&quot;User-generated caption, visible on account profile. &quot;]">User-generated caption, visible on account profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_ethnicity&quot;]">profile_ethnicity</td>
<td data-sheets-value="[null,2,&quot;User's self-identified ethnicity, expressed as a number. &quot;]">User&#8217;s self-identified ethnicity, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_weight&quot;]">profile_weight</td>
<td data-sheets-value="[null,2,&quot;User's weight, visible on profile. &quot;]">User&#8217;s weight, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_height&quot;]">profile_height</td>
<td data-sheets-value="[null,2,&quot;User's height, visible on profile. &quot;]">User&#8217;s height, visible on profile.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_bodytype&quot;]">profile_bodytype</td>
<td data-sheets-value="[null,2,&quot;User's body type, expressed as a number.  &quot;]">User&#8217;s body type, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_smoke&quot;]">profile_smoke</td>
<td data-sheets-value="[null,2,&quot;Whether or not user reports smoking. &quot;]">Whether or not user reports smoking.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_drink&quot;]">profile_drink</td>
<td data-sheets-value="[null,2,&quot;Whether or not user reports drinking. &quot;]">Whether or not user reports drinking.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_initially_seeking&quot;]">profile_initially_seeking</td>
<td data-sheets-value="[null,2,&quot;What the user is initially seeking, expressed as a number. &quot;]">What the user is initially seeking, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;profile_relationship&quot;]">profile_relationship</td>
<td data-sheets-value="[null,2,&quot;User's relationship status, expressed as a number. &quot;]">User&#8217;s relationship status, expressed as a number.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_opento&quot;]">pref_opento</td>
<td data-sheets-value="[null,2,&quot;Type of experience the user is willing to try, listed as numbers. &quot;]">Type of experience the user says he or she is willing to try (or &#8220;open to&#8221;), listed as numbers.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_opento_other&quot;]">pref_opento_other</td>
<td data-sheets-value="[null,2,&quot;What the user hopes a match will be open to &quot;]">What the user hopes a match will be open to</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_opento_abstract&quot;]">pref_opento_abstract</td>
<td data-sheets-value="[null,2,&quot;User-written statement of what the user is willing to participate in. &quot;]">User-written statement of what the user is willing to participate in.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_turnsmeon&quot;]">pref_turnsmeon</td>
<td data-sheets-value="[null,2,&quot;List of things that excite the user. Expressed in numbers. &quot;]">Items that the user says he or she is interested in. Expressed in numbers.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_turnsmeon_other&quot;]">pref_turnsmeon_other</td>
<td data-sheets-value="[null,2,&quot;List of things that the user wants a match to be excited by. Numbers. &quot;]">List of things that the user wants a match to be interested in. Expressed in numbers.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_turnsmeon_abstract&quot;]">pref_turnsmeon_abstract</td>
<td data-sheets-value="[null,2,&quot;Written description of the user's turn-ons. &quot;]">Written description of the user&#8217;s &#8220;turn-ons.&#8221;</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_lookingfor&quot;]">pref_lookingfor</td>
<td data-sheets-value="[null,2,&quot;Attributes the user is looking for in a match/dating experience. &quot;]">Attributes the user is looking for in a match/dating experience.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_lookingfor_other&quot;]">pref_lookingfor_other</td>
<td data-sheets-value="[null,2,&quot;List of attributes the user hopes a match is looking for. &quot;]">List of attributes the user hopes a match is looking for.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;pref_lookingfor_abstract&quot;]">pref_lookingfor_abstract</td>
<td data-sheets-value="[null,2,&quot;User's description of a preferred match. &quot;]">User&#8217;s description of a preferred match.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;main_photo&quot;]">main_photo</td>
<td data-sheets-value="[null,2,&quot;User's uploaded photo. &quot;]">User&#8217;s uploaded photo.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;security_question&quot;]">security_question</td>
<td data-sheets-value="[null,2,&quot;User's security question. &quot;]">User&#8217;s security question.</td>
</tr>
<tr>
<td data-sheets-value="[null,2,&quot;security_answer&quot;]">security_answer</td>
<td data-sheets-value="[null,2,&quot;Answer to user's security question. &quot;]">Answer to user&#8217;s security question.</td>
</tr>
</tbody>
</table>
<p>This is a complete list of all of the fields in the MySQL portion of the database. However, s<span style="font-weight: 400;">everal of the fields use numerical codes to indicate a selection from the user. “profile_relationship” specifies the relationship status of the user as follows:</span></p>
<p>1: “Attached Female Seeking Male”<br />
<span style="font-weight: 400;">2: “Attached Male Seeking Female”<br />
</span><span style="font-weight: 400;">3: “Single Male Seeking Female”<br />
</span><span style="font-weight: 400;">4: “Single Female Seeking Male”<br />
</span><span style="font-weight: 400;">5: “Male Seeking Male”<br />
</span><span style="font-weight: 400;">6: “Female Seeking Female”</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;"><br />
</span><span style="font-weight: 400;">The “pref_opento” field contains a number that correlates to one of the following:</span></p>
<p><span style="font-weight: 400;">1: &#8220;Threesome&#8221;<br />
</span><span style="font-weight: 400;">3: &#8220;Being Dominant/Master&#8221;<br />
</span><span style="font-weight: 400;">4: &#8220;Being Submissive/Slave&#8221;<br />
</span><span style="font-weight: 400;">6: &#8220;Bondage&#8221;<br />
</span><span style="font-weight: 400;">7: &#8220;Conventional Sex&#8221;<br />
</span><span style="font-weight: 400;">11: &#8220;Fetishes&#8221;<br />
</span><span style="font-weight: 400;">14: &#8220;Nothing Kinky&#8221;<br />
</span><span style="font-weight: 400;">15: &#8220;One-Night Stands&#8221;<br />
</span><span style="font-weight: 400;">17: &#8220;Role Playing&#8221;<br />
</span><span style="font-weight: 400;">18: &#8220;Sex Talk&#8221;<br />
</span><span style="font-weight: 400;">19: &#8220;Spanking&#8221;<br />
</span><span style="font-weight: 400;">21: &#8220;Experimenting with Tantric Sex&#8221;<br />
</span><span style="font-weight: 400;">22: &#8220;Transvestitism&#8221;<br />
</span><span style="font-weight: 400;">23: &#8220;Experimenting with Sex Toys&#8221;<br />
</span><span style="font-weight: 400;">23: &#8220;Exploring with Sex Toys&#8221;<br />
</span><span style="font-weight: 400;">26: &#8220;Aggressiveness&#8221;<br />
</span><span style="font-weight: 400;">27: &#8220;Blindfolding&#8221;<br />
</span><span style="font-weight: 400;">28: &#8220;Bubble Bath for 2&#8221;<br />
</span><span style="font-weight: 400;">29: &#8220;Cuddling &amp; Hugging&#8221;<br />
</span><span style="font-weight: 400;">30: &#8220;Curious &#8211; Domination&#8221;<br />
</span><span style="font-weight: 400;">31: &#8220;Curious &#8211; Submission&#8221;<br />
</span><span style="font-weight: 400;">32: &#8220;Dressing Up/Lingerie&#8221;<br />
</span><span style="font-weight: 400;">33: &#8220;Erotic Movies&#8221;<br />
</span><span style="font-weight: 400;">34: &#8220;Erotic Tickling&#8221;<br />
</span><span style="font-weight: 400;">36: &#8220;Extended Foreplay/Teasing&#8221;<br />
</span><span style="font-weight: 400;">37: &#8220;Gentleness&#8221;<br />
</span><span style="font-weight: 400;">38: &#8220;Good With Your Hands&#8221;<br />
</span><span style="font-weight: 400;">39: &#8220;Kissing&#8221;<br />
</span><span style="font-weight: 400;">40: &#8220;Light Kinky Fun&#8221;<br />
</span><span style="font-weight: 400;">41: &#8220;Likes to be Watched/Exhibitionism&#8221;<br />
</span><span style="font-weight: 400;">42: &#8220;Likes to Give Oral Sex&#8221;<br />
</span><span style="font-weight: 400;">43: &#8220;Likes to Receive Oral Sex&#8221;<br />
</span><span style="font-weight: 400;">44: &#8220;Likes to Go Slow&#8221;<br />
</span><span style="font-weight: 400;">45: &#8220;Lots of Stamina&#8221;<br />
</span><span style="font-weight: 400;">46: &#8220;Open to Experimentation&#8221;<br />
</span><span style="font-weight: 400;">48: &#8220;Sensual Massage&#8221;<br />
</span><span style="font-weight: 400;">49: &#8220;Sharing Fantasies&#8221;<br />
</span><span style="font-weight: 400;">50: &#8220;Someone I Can Teach&#8221;<br />
</span><span style="font-weight: 400;">51: &#8220;Someone Who Can Teach Me&#8221;<br />
</span><span style="font-weight: 400;">52: &#8220;You Like to Cross Dress&#8221;</span></p>
<p><span style="font-weight: 400;">The &#8220;looking for&#8221; section also contains a number that correlates to the following:</span></p>
<p><span style="font-weight: 400;">1: &#8220;A Don Juan&#8221;<br />
</span><span style="font-weight: 400;">4: &#8220;Sense of Humor&#8221;<br />
</span><span style="font-weight: 400;">6: &#8220;Aggressive/Take Charge Nature&#8221;<br />
</span><span style="font-weight: 400;">9: &#8220;Average Sex Drive&#8221;<br />
</span><span style="font-weight: 400;">10: &#8220;Confidence&#8221;<br />
</span><span style="font-weight: 400;">11: &#8220;Discretion/Secrecy&#8221;<br />
</span><span style="font-weight: 400;">12: &#8220;Dislikes Routine&#8221;<br />
</span><span style="font-weight: 400;">14: &#8220;Good Personal Hygiene&#8221;<br />
</span><span style="font-weight: 400;">16: &#8220;Has a Secret Love Nest&#8221;<br />
</span><span style="font-weight: 400;">17: &#8220;High Sex Drive&#8221;<br />
</span><span style="font-weight: 400;">18: &#8220;Imagination&#8221;<br />
</span><span style="font-weight: 400;">19: &#8220;Likes Routine&#8221;<br />
</span><span style="font-weight: 400;">30: &#8220;A Professional/Well Groomed&#8221;<br />
</span><span style="font-weight: 400;">31: &#8220;Stylish/Classy&#8221;<br />
</span><span style="font-weight: 400;">32: &#8220;Casual Jeans/T-shirt Type&#8221;<br />
</span><span style="font-weight: 400;">33: &#8220;Tattoos&#8221;<br />
</span><span style="font-weight: 400;">34: &#8220;Body Piercing&#8221;<br />
</span><span style="font-weight: 400;">35: &#8220;BBW&#8221;<br />
</span><span style="font-weight: 400;">36: &#8220;Full Size Body&#8221;<br />
</span><span style="font-weight: 400;">37: &#8220;Muscular/Fit Body&#8221;<br />
</span><span style="font-weight: 400;">38: &#8220;Petite Figure&#8221;<br />
</span><span style="font-weight: 400;">39: &#8220;Slim to Average Body&#8221;<br />
</span><span style="font-weight: 400;">40: &#8220;Tall Height&#8221;<br />
</span><span style="font-weight: 400;">41: &#8220;Short Height&#8221;<br />
</span><span style="font-weight: 400;">42: &#8220;Long Hair&#8221;<br />
</span><span style="font-weight: 400;">43: &#8220;Short Hair&#8221;<br />
</span><span style="font-weight: 400;">44: &#8220;Girl Next Door&#8221;<br />
</span><span style="font-weight: 400;">45: &#8220;Naughty Girl&#8221;<br />
</span><span style="font-weight: 400;">46: &#8220;Bad Boy&#8221;<br />
</span><span style="font-weight: 400;">47: &#8220;Boy Next Door&#8221;<br />
</span><span style="font-weight: 400;">48: &#8220;Creative and Adventurous&#8221;<br />
</span><span style="font-weight: 400;">49: &#8220;Relaxed and Easy Going&#8221;<br />
</span><span style="font-weight: 400;">50: &#8220;Hopeless Romantic&#8221;<br />
</span><span style="font-weight: 400;">51: &#8220;A Father Figure&#8221;<br />
</span><span style="font-weight: 400;">52: &#8220;Not Possessive&#8221;<br />
</span><span style="font-weight: 400;">53: &#8220;A Good Listener&#8221;<br />
</span><span style="font-weight: 400;">54: &#8220;Good Communicator&#8221;<br />
</span><span style="font-weight: 400;">55: &#8220;Disease Free&#8221;<br />
</span><span style="font-weight: 400;">56: &#8220;Drug Free&#8221;<br />
</span><span style="font-weight: 400;">57: &#8220;Casual/Social Drinker&#8221;<br />
</span><span style="font-weight: 400;">58: &#8220;Seeking a Sugar Baby&#8221;<br />
</span><span style="font-weight: 400;">59: &#8220;Seeking a Sugar Daddy&#8221;<br />
</span><span style="font-weight: 400;">60: &#8220;Natural Breasts&#8221;<br />
</span><span style="font-weight: 400;">61: &#8220;Facial Hair&#8221;<br />
</span><span style="font-weight: 400;">62: &#8220;Tall, Dark and Handsome&#8221;</span></p>
<p><span style="font-weight: 400;">Datarecovery.com offers computer forensics services, which can help to verify the presence (or non-presence) of an individual’s information in the Ashley Madison leak. Given the nature of this leak, we offer this service exclusively to victims — not to spouses or other individuals. For more information, speak with a computer forensics expert by calling 1-800-237-4200.</span></p>
<p>The post <a href="https://datarecovery.com/rd/the-ashley-madison-leak-what-information-was-released/">The Ashley Madison Leak: What Information Was Released?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Datarecovery.com Offers Simple Way to Verify Ashley Madison Leaks</title>
		<link>https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/</link>
					<comments>https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 27 Aug 2015 17:33:56 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Data Loss Prevention]]></category>
		<category><![CDATA[Database]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?p=4284</guid>

					<description><![CDATA[<p>Datarecovery.com, Inc., a world leader in computer forensics services, will provide customers with a simple way to verify whether their personally identifiable information has been made publicly accessible through high-profile security breaches, including the recent leaks from dating website Ashley...</p>
<p>The post <a href="https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/">Datarecovery.com Offers Simple Way to Verify Ashley Madison Leaks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Datarecovery.com, Inc., a world leader in computer forensics services, will provide customers with a simple way to verify whether their personally identifiable information has been made publicly accessible through high-profile security breaches, including the recent leaks from dating website Ashley Madison.</p>
<p>“This is one of the most significant Internet security breaches in history”</p>
<p>Hackers began releasing the Ashley Madison data to torrent websites and the Dark Web (hidden networks that require specialized software to access) in late July, starting with more than 10 gigabytes of stolen data. Last week, another 20 gigabytes of data was released. The files contain personal information for millions of users.</p>
<p>The leaks have garnered significant media attention because of the unique nature of the Ashley Madison website, which markets its services towards people in committed relationships who want to start affairs. According to multiple sources, the released information has led to divorces and other serious consequences for some users.</p>
<p>“It’s a major breach of privacy, and users need to know whether or not they were affected,” said Ben Carmitchel, President of Datarecovery.com. “We’re offering the first computer forensics service specifically geared towards the victims of this type of data security breach.”</p>
<p>The computer forensics experts at Datarecovery.com can independently verify if an individual’s information was released, and to what extent. Customers can request information by using first and last name, email address and other personally identifiable information. The service is only available to primary users of hacked websites — not their spouses or other individuals.</p>
<p>While several websites have been set up to search through the leaked data, Ashley Madison has quickly taken them down by issuing Digital Millennial Copyright Act (DMCA) notices. Many of the remaining sites only search through some of the leaked data, and all sites ask for users’ email addresses, opening up additional security concerns.</p>
<p>“This is one of the most significant Internet security breaches in history,” said Carmitchel. “Our service is intended to help the affected users protect their sensitive data and retain some degree of privacy.”</p>
<p>Datarecovery.com is a worldwide leader in computer forensics and data recovery services. With four locations in <a href="https://datarecovery.com/about/bay-area/">California</a>, <a href="https://datarecovery.com/about/st-louis/">Illinois</a>, <a href="https://datarecovery.com/about/phoenix/">Arizona</a>, and <a href="https://datarecovery.com/about/toronto/">Toronto</a>, the company provides a variety of services to thousands of clients each year. Visit <a href="http://datarecovery.com">datarecovery.com</a> for more information.</p>
<p><strong>Contacts</strong></p>
<p>Datarecovery.com, Inc.<br />
Benjamin Carmitchel, CEO<br />
602-635-2020<br />
ben.carmitchel@datarecovery.com</p>
<p>The post <a href="https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/">Datarecovery.com Offers Simple Way to Verify Ashley Madison Leaks</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2015/08/datarecovery-com-offers-simple-way-to-verify-ashley-madison-leaks/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>A Guide to Mobile Phone Text Message Recovery</title>
		<link>https://datarecovery.com/rd/guide-to-mobile-phone-text-message-recovery/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 06 Jul 2015 20:33:10 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Data Types]]></category>
		<category><![CDATA[Media]]></category>
		<category><![CDATA[Mobile Device]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=4110</guid>

					<description><![CDATA[<p>This thorough process and custom software solution really separates our service from the hardware and software products available...In a recent case, the best commercial software was able to find 2,098 text messages, while we recovered 3,756 valid messages – 79% more.</p>
<p>The post <a href="https://datarecovery.com/rd/guide-to-mobile-phone-text-message-recovery/">A Guide to Mobile Phone Text Message Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-4122" src="https://datarecovery.com/wp-content/uploads/2015/07/text-message-recovery-327x272.png" alt="Text Message Data Recovery" width="327" height="272" srcset="https://datarecovery.com/wp-content/uploads/2015/07/text-message-recovery-327x272.png 327w, https://datarecovery.com/wp-content/uploads/2015/07/text-message-recovery-327x272-300x250.png 300w" sizes="auto, (max-width: 327px) 100vw, 327px" />Datarecovery.com has developed targeted recovery software for numerous cell phone operating systems, and with our background in computer forensics and flash media recovery, we are the leading option for mobile phone data recovery. Many of our clients attempt to recover text messages — not surprising, since the average smartphone owner sends about 30-60 texts per day.</p>
<p>We&#8217;re also called upon to recover text messages as evidence for court cases and other legal processes, and cell phone recovery is one of the fastest-growing segments of our business. In this article, I&#8217;ll detail some of the methods that we use to recover text messages from damaged cell phones. Some of these techniques are also used for other types of data associated with smartphones.</p>
<h2>Getting Access to the Data On a Damaged Cell Phone</h2>
<p><img loading="lazy" decoding="async" class="alignright wp-image-4117 size-full" title="Broken Cell Phone Samsung" src="https://datarecovery.com/wp-content/uploads/2015/07/broken-cell-phone-samsung2-200x358.jpg" alt="Broken Cell Phone Samsung" width="200" height="358" srcset="https://datarecovery.com/wp-content/uploads/2015/07/broken-cell-phone-samsung2-200x358.jpg 200w, https://datarecovery.com/wp-content/uploads/2015/07/broken-cell-phone-samsung2-200x358-168x300.jpg 168w" sizes="auto, (max-width: 200px) 100vw, 200px" /><img loading="lazy" decoding="async" class="alignright wp-image-4115 size-full" title="Broken Cell Phone iPhone 200x367" src="https://datarecovery.com/wp-content/uploads/2015/07/broken-cell-phone-iphone1-200x367.jpg" alt="Broken Cell Phone iPhone" width="200" height="367" srcset="https://datarecovery.com/wp-content/uploads/2015/07/broken-cell-phone-iphone1-200x367.jpg 200w, https://datarecovery.com/wp-content/uploads/2015/07/broken-cell-phone-iphone1-200x367-163x300.jpg 163w" sizes="auto, (max-width: 200px) 100vw, 200px" />Of course, if someone&#8217;s calling Datarecovery.com, there&#8217;s a good chance that their cell phone has been damaged (either intentionally or accidentally). In order to start recovering text messages, we need to get access to the data on the phone, and that can be a difficult process.</p>
<p>Engineers use advanced tools and techniques to recover data from the device in wide ranging types of failures and damage. Depending on the damage, sometimes we can restore the device to a temporary functioning state to access the data somewhat natively (meaning that we can just plug in the phone and read the data as the manufacturer intended).</p>
<p>However, if there&#8217;s a severe underlying problem, the actual data may be damaged. Crippling damage to text message data may occur not only through physical or electrical means, but also through overwriting due to deletion, corruption, operating system updates, or factory resets. When native access is not an option, we&#8217;ll do whatever it takes to obtain a data image and work from there. Many repair techniques necessitate an ISO 5 cleanroom and other expensive equipment, so we&#8217;ll avoid a lengthy discussion of those methods for now.</p>
<h2>Where are Text Messages Stored on a Modern Cell Phone?</h2>
<p>Text messages are generally stored in smartphones in an SQLite database. This is true across various manufacturers, but unfortunately for our engineers, the database type is where the similarities end.</p>
<p><img loading="lazy" decoding="async" class="alignright wp-image-4113 size-full" title="text messages in raw hex data" src="https://datarecovery.com/wp-content/uploads/2015/07/text-messages-raw-data-identified-271x409.jpg" alt="Text messages and components identified in raw hex data for recovery" width="271" height="409" srcset="https://datarecovery.com/wp-content/uploads/2015/07/text-messages-raw-data-identified-271x409.jpg 271w, https://datarecovery.com/wp-content/uploads/2015/07/text-messages-raw-data-identified-271x409-199x300.jpg 199w" sizes="auto, (max-width: 271px) 100vw, 271px" />Each different cell phone model will typically have a different database schema, or table structure, in which it stores text message data. Now, commercial software tools exist that can help recover text message data from functioning SQLite databases — but options are slim when there is damage to the database.</p>
<p>To obtain as many text messages as possible from a damaged phone, we work with the raw data image and we use special software (developed in house) along with some manual data evaluation and analysis.</p>
<p>The first step is determining the definition of the database table containing the messages. This process will include deciphering how each of the components of a text message record are stored, including associated phone numbers, service center number, timestamps, and the message body.</p>
<h2>The Text Message Record and Cell Phone Message Recovery</h2>
<p>The second step includes the identification of a text message record. There can even be more than one format to account for. After we have a grip on this, we need to write the definition so that our recovery program will be able to identify message records, and interpret the various components correctly from raw data.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-4112 size-full" title="Recovered single text message in raw hex" src="https://datarecovery.com/wp-content/uploads/2015/07/text-message-raw-data.png" alt="Recovered text message in raw hex data" width="537" height="144" srcset="https://datarecovery.com/wp-content/uploads/2015/07/text-message-raw-data.png 537w, https://datarecovery.com/wp-content/uploads/2015/07/text-message-raw-data-300x80.png 300w" sizes="auto, (max-width: 537px) 100vw, 537px" /></p>
<p>The identification of a text message record is crucial because in the uncertainty of raw data, defining the method used to find text messages will determine whether all the text messages are recovered; if the text message record is improperly defined, a significant number of messages may be missed.</p>
<p>We are extremely careful to ensure that our methods will not miss any potentially valuable text message, including damaged partial message records. We do this by using the lowest possible minimum requirements for identification in our algorithm while still ensuring that there are few false positives.</p>
<p>We then perform rigorous testing, performing numerous checks on known text message data areas we&#8217;ve discovered in separate analysis. Finally, after we&#8217;ve run our software, we complete a final comparison check between the text messages extracted and the text messages known in raw data. This allows our engineers to make sure that they have everything.</p>
<p>I need to stress that this thorough process and custom software solution really separates our service from the hardware and software products available commercially, and also from other forensic companies and law enforcement agencies that use them. We certainly have many commercial hardware/software products available in our laboratories, and we use them when appropriate.</p>
<p>However, our process allows us to recover more than any commercial product when required by the situation; by using a combination manual techniques and tailored software processing, we can perform a much more thorough text message recovery than any individual software or hardware tool. In a recent case, the best commercial software was able to find 2,098 text messages, while we recovered 3,756 valid messages – 79% more. I think this shows the value of experience; if you have a cellphone and need to recover missing text messages and other mobile data, you can be assured that Datarecovery.com will give you the best possible result.</p>
<p>For more information on our cell phone related services <a href="https://datarecovery.com/services/cell-phone-data-recovery/">visit this page</a>, or call us at 1.800.237.4200.</p>
<p>The post <a href="https://datarecovery.com/rd/guide-to-mobile-phone-text-message-recovery/">A Guide to Mobile Phone Text Message Recovery</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Datarecovery.com, Inc. Recovers Data from Sunken Laptop to Assist in Jack McAtee Missing Persons Case</title>
		<link>https://datarecovery.com/2014/12/datarecovery-com-inc-recovers-data-from-sunken-laptop-to-assist-in-jack-mcatee-missing-persons-case/</link>
					<comments>https://datarecovery.com/2014/12/datarecovery-com-inc-recovers-data-from-sunken-laptop-to-assist-in-jack-mcatee-missing-persons-case/#respond</comments>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Mon, 15 Dec 2014 15:21:03 +0000</pubDate>
				<category><![CDATA[Computer Forensics]]></category>
		<category><![CDATA[Damage]]></category>
		<category><![CDATA[Data Recovery News]]></category>
		<category><![CDATA[Outreach]]></category>
		<category><![CDATA[computer forensics]]></category>
		<category><![CDATA[water damage]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?p=3789</guid>

					<description><![CDATA[<p>December 12, 2014 &#8211; Phoenix, AZ &#8211; Datarecovery.com, a world leader in computer forensics and data recovery, was able to recover potentially important data from an extensively damaged laptop computer owned by Jack McAtee.<br />
On September 18th, McAtee crashed his...</p>
<p>The post <a href="https://datarecovery.com/2014/12/datarecovery-com-inc-recovers-data-from-sunken-laptop-to-assist-in-jack-mcatee-missing-persons-case/">Datarecovery.com, Inc. Recovers Data from Sunken Laptop to Assist in Jack McAtee Missing Persons Case</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><img loading="lazy" decoding="async" class="alignright size-full wp-image-3794" src="http://datarecovery.com/wp-content/uploads/2014/12/pressrelease-jack-mcatee.jpg" alt="Jack McAtee photo, missing person" width="188" height="188" srcset="https://datarecovery.com/wp-content/uploads/2014/12/pressrelease-jack-mcatee.jpg 188w, https://datarecovery.com/wp-content/uploads/2014/12/pressrelease-jack-mcatee-90x90.jpg 90w, https://datarecovery.com/wp-content/uploads/2014/12/pressrelease-jack-mcatee-150x150.jpg 150w" sizes="auto, (max-width: 188px) 100vw, 188px" />December 12, 2014 &#8211; Phoenix, AZ &#8211; Datarecovery.com, a world leader in computer forensics and data recovery, was able to recover potentially important data from an extensively damaged laptop computer owned by Jack McAtee.</p>
<p>On September 18th, McAtee crashed his car into Dillon Reservoir in Summit County, Colorado. McAtee is bipolar and stopped taking his medication prior to his erratic behavior. Although he was briefly taken into protective custody, he was released and has been missing since September 19th.</p>
<p>His family believes that he headed on foot into the Summit County wilderness area to camp, or that he began hitchhiking on Interstate 70. “We now are wanting to expand our search to the west,” explained Steve McAtee, Jack’s father. “There&#8217;s a good possibility that he could&#8217;ve just gotten on the highway and hitchhiked west. Jack previously spent some time in California and we are hoping that he may have headed out to the Placerville or the Mendocino, California area.&#8221;</p>
<p>Believing that the laptop computer could contain information vital to the investigation, the McAtee family contacted Datarecovery.com for assistance. Datarecovery.com provided its services free of charge.</p>
<p>&#8220;When a computer hard drive is fully submerged in dirty water for days or weeks, it&#8217;s important to attempt data recovery as soon as possible in order to limit damage from corrosion,&#8221; said Ben Carmitchel, President of Datarecovery.com. &#8220;We received the hard drive several weeks after the incident, which complicated the recovery. By using highly advanced methods, we were able to fully recover Mr. McAtee&#8217;s data.&#8221;</p>
<p>The process required specialized treatment in a Class 5 clean room at Datarecovery.com&#8217;s laboratory in Phoenix, Arizona. Datarecovery.com engineers provided investigators with key information from the computer, including the Internet browser history. This information has provided critical clues to Jack&#8217;s whereabouts, including plans he made prior to his disappearance.</p>
<p>&#8220;We&#8217;re asking our customers to spread the word about this case,&#8221; said Carmitchel. &#8220;We want to see Jack McAtee come home safely, and we stand with the McAtee family during this difficult time.&#8221;</p>
<p>Jack&#8217;s father, Steve McAtee, has offered $10,000 for their son&#8217;s safe return. Information about Jack, including pictures and up-to-date investigation information, is available at http://www.findjackmcatee.com. When he was last seen, Jack McAtee was wearing a maroon hooded sweatshirt with brown moccasins and blue jeans. He is 5 feet, 10 inches tall and weighs about 170 pounds. Individuals with information related to Jack&#8217;s whereabouts should call (970) 453-2232 or (970) 668-8600.</p>
<p>Datarecovery.com, Inc. is a world leader in data recovery and computer forensics. With four locations in California, Illinois, Arizona, and Toronto, the company provides a variety of services to thousands of clients each year.</p>
<p><strong>Contact Information</strong></p>
<p>Datarecovery.com, Inc.<br />
Ben Carmitchel<br />
1-602-635-2020<br />
datarecovery.com</p>
<p>The post <a href="https://datarecovery.com/2014/12/datarecovery-com-inc-recovers-data-from-sunken-laptop-to-assist-in-jack-mcatee-missing-persons-case/">Datarecovery.com, Inc. Recovers Data from Sunken Laptop to Assist in Jack McAtee Missing Persons Case</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://datarecovery.com/2014/12/datarecovery-com-inc-recovers-data-from-sunken-laptop-to-assist-in-jack-mcatee-missing-persons-case/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 126/155 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-13 19:09:04 by W3 Total Cache
-->