0% found this document useful (0 votes)
11 views5 pages

Approach For Icag Delegates

The document provides guidelines for verifying email authenticity and downloading specific tools for personal laptops. It outlines steps for downloading applications from the NirSoft website and using various online tools to monitor web activities, browser cache, USB connections, and recent activities. Additionally, it includes command procedures for querying DNS, tracing IP routes, and managing Wi-Fi profiles via command prompt.

Uploaded by

commeypeteroko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views5 pages

Approach For Icag Delegates

The document provides guidelines for verifying email authenticity and downloading specific tools for personal laptops. It outlines steps for downloading applications from the NirSoft website and using various online tools to monitor web activities, browser cache, USB connections, and recent activities. Additionally, it includes command procedures for querying DNS, tracing IP routes, and managing Wi-Fi profiles via command prompt.

Uploaded by

commeypeteroko
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

RELEVANT POINTERS FOR EMAILS:

• Copy the email address in question.


• Paste it into a notepad or Word document.
• Highlight the pasted email address and convert it to uppercase. Then, verify the
authenticity of the email address. If you're familiar with the person, consider
making a call for confirmation.
• If the email contains attachments (especially if it seems suspicious), contact the
Systems/IT administrator before downloading any files or clicking on links.

PRACTICALS & PROCEDURE (THIS IS FOR PERSONAL LAPTOP/MACHINES ONLY)

How to download the tools below:

• Navigate to the links listed in the location column.


• Ensure you are downloading from the official “NirSoft” website.
• Scroll down to the feedback section, and download the version labeled "with x64."
If unavailable, download any .exe file from the page.
• After downloading, go to your Downloads folder, locate the downloaded file, and
click on it once to begin extraction.
• Run the “application” file (you’ll also see a Readme and an HTML file—do not
interact with them).
• If you're working with browser history, you'll be prompted to specify a time and
date. Select “from any time” from the dropdown menu.
• Choose "All users" and leave the default options checked.
• Run or start the application.
• Keep in mind that the creation time and date are crucial for your case.
S/N ONLINE TOOL REASON LOCATION
1. Browsing History View To monitor all web Link to site
activities (including
local file visits) on your
device/laptop/computer,
which helps identify the
areas accessed by a
suspect, victim, or
subject under
investigation.
2. MZ History view To view which resources Link to site
(like images, scripts, or
stylesheets) have been
stored in the cache by
the browser, helping
them understand what
data is being reused
without re-downloading
for firefox.
3. USB Deview It shows a list of all USB Link to site
devices ever connected
to your computer,
including devices that
are currently plugged in
and those that were
connected in the past
but are no longer
attached. (NB: This
doesn’t show all real
time connections)
4. Last Activity View It tracks and displays a Link to site
list of recent activities
on a Windows machine
5. Have I been squatted (Do not the practice of Link to site
download this) its is an online registering, using, or
resource. selling a domain name
that is similar or
identical to a well-
known brand or
trademark. E.g. icag.org
is different from iacg.org
and icaag.org

S/N COMMAND IN CMD Procedure REASON FOR COMMAND


Nslookup “domain”. E.g. nslookup amazon.com 1. Open cmd (on to query DNS (Domain Name System)
your machine servers to obtain information about domain
NB: Every domain has its corresponding IP search bar, NOT names, ip address etc.
address. google/internet)
2. Type the
command.

Tracert “ip”. 1. Open cmd (on It shows the sequence of hops (routers or
your machine devices) that data packets travel through to
E.g. tracert 205.251.242.103 search bar, NOT reach a destination.
google/internet)
2. Type the E.g. If you want to search for “e-
command. crimebureau.com” on the internet, “e-
crimebureau”, changes to a register IP
address, then the command moves from
your device to your router, then goes
through series of locations to fetch for that
information you are searching for.
netsh wlan show profiles 1. Open cmd as an It displays a list of all Wi-Fi network
administrator profiles that have been saved on your
Then (on your computer (including connected or not
machine search connected to)
bar, NOT
google/internet) This displays the details of a specific Wi-Fi
netsh wlan show profile name="Profile name" 2. Type the first profile. By specifying the “key=clear”
key=clear, command, hit option, the command also reveals the Wi-
enter Fi password (if stored in the profile) in
3. Type the second plain text.
command, hit
enter

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy