[Lepton Incorporated - Le Logo]

Data Preservation & Recovery

Home
Services
Contents
Previous Web Site
Contacts

Technical Areas

Web & Internet Technologies
Wireless Networking
Scientific Computing
Software & System Optimization
2D & 3D Graphics
Device Drivers & Hardware Interfaces
Firmware & BIOS
Bioinformatics
Distributed Systems

 

Lepton offers data duplication and investigation services.  We have the ability to create disk images for offsite forensic investigation, search for lost and deleted data and provide password recovery services for common encryption techniques. 

Lepton's Advantage

bullet 
Seasoned data processing staff with forensic experience.
bullet 
Services available at client site or at Lepton's facilities.  
bullet 
Advanced tools to retrieve and interpret evidence of activity.

Capabilities

Data Duplication and Preservation
Lepton has the capacity to make byte level copies of disk media at Lepton's facilities or at a client's site.  This allows the the original media to be returned to the owner for use while a complete duplicate is retained for further examination.
 
Recovery of Deleted, Fragmentary, and Indirect Information
The way data is presented to a computer's does not completely reflect the way data is stored on media.  Data which appears to have been deleted may persist on the drive. Data which has never been intentionally saved may still be stored in temporary files.  Finally, while data may have been erased, indirect evidence of the data's presence may still exist on the media.  Lepton has tools to search for and recover all of these forms of data. 
 
Password Recovery and File Decryption
Carefully encrypted files may be extremely difficult to decrypt without the appropriate keys. However, many common applications that use passwords to protect data use less sophisticated encryption techniques which can be reversed without the keys.  Lepton has experience with the process of password recovery and the decryption of such files. 
 
Retrieval of Activity  Evidence
Many systems maintain evidence of past activity after that activity occurs. While often this evidence takes the form of administrative log files, more subtle evidence may occur in other areas such as file modification times.  Lepton staff have experience finding and interpreting this evidence.
 

Home ] Services ] Contents ] Previous Web Site ] Contacts ]

Send mail to WebServices@LeptonCorp.com with questions or comments about this web site.
Copyright 2002 Lepton Incorporated
Last modified: April 15, 2002