Chilly there are a number of computer forensic websites available if your up for the research . http://128.175.24.251/forensics/default.htm
This will explain what Created Date and Last Accessed mean
Accessed Date The last time that the cookies file was accessed by the Web site.
Modified Date The last time that the cookies file was modified by the Web site.
Created Date The time that the cookies file was originally created.
http://74.125.45.104/search?q=cache:...nk&cd=20&gl=us
*******************************
Below is what we have of KC & Cindy's computer reports in ref. to ZG . Please note that if you view the report it's pretty clear at least to me that it is incomplete, it just ends with out any signed documentation from the Orange County Sheriff’s Office Criminal Investigations Division
Computer Crimes Squad .We also know this is an incomplete report as the Cloroform searches aren't included.
(
laptop )
On July 16, 2008 at approximately 2000 hours, Detective Charity Beasley of the Orange County Sheriff's Office Domestic Violence Squad on behalf of Detective Corporal Yuri Melich, submitted a Compaq Presario C300
laptop computer; serial number CND6430RKH (with the power cord)
No photographs, video, email, instant message chat or any other type of
communication with a Zenaida Fernandez-Gonzalez was discovered on either computer.
************************************************** *********
The HP Pavillon Desktop computer
The Internet History for the
profile "Casey" on the HP computer was extracted via Net Analysis. The History was then filtered for both "MySpace" and for"facebook."
All the Internet History files were saved to the Evidence\Internet History\Cindy Desktop computer\Casey profile folders as comma delimited files for viewing using Excel.
A keyword search for "Zenaida" revealed Web pages indicating that a user
searched the Internet for that name on July 16, 2008. Those entries were
bookmarked under the "Zenaida Fernandez Gonzalez" section of this report.
Zenaida Fernandez Gonzalez
A keyword search for "Zenaida" was conducted on the HP desktop computer. The following files are records of web pages indicating that someone was searching for that name on the Internet.
Name:
casey@www.reunion[2].txt
Description: File, Archive
File Created: 07/16/08 06:21:17AM
Last Accessed: 07/16/08 06:21:27AM
Last Written: 07/16/08 06:21:27AM
Full Path: 08-069208\S013J10X237614\D\Documents and Settings\casey\Cookies\casey@www.reunion[2].txt
zenaida
Name: history.dat
Description: File, Archive
File Created: 10/22/07 01:13:21PM
Last Accessed: 07/16/08 12:03:24PM
Last Written: 07/16/08 12:03:24PM
Full Path: 08-069208\S013J10X237614\D\Documents and Settings\casey\Application
Data\Mozilla\Firefox\Profiles\mfhaxjkl.default\his tory.dat
http://friends.
myspace.com/index.cfm?fuseaction=user.viewfriends\ =203461948897ec12-9984-4944-b65e-
6dcef3d5a590=
zenaida
********************************
Name:
index.dat
Description: File, Archive
File Created: 06/12/08 11:15:29PM
Last Accessed: 06/12/08 11:15:29PM
Last Written: 07/16/08 04:20:12PM
Full Path: 08-069208\S013J10X237614\
D\Documents and Settings\casey\Local Settings\Temporary Internet
Files\Content.IE5\index.dat
http://clk.atdmt.com/RUC/go/whtpgreu...?dispatch=show
SearchRegistration&action=peopleSearch_wp_resultco unt&city=&mname=&peopleSearchFrom=wp&affiliate
id=131&searchFirstName=
zenaida&searchLastName=
Gonzalez&
searchAge=25
**********************************
Name:
index.dat
Description: File, Archive
File Created: 06/12/08 11:15:29PM
Last Accessed: 06/12/08 11:15:29PM
Last Written: 07/16/08 04:20:12PM
Full Path: 08-069208\S013J10X237614\D\Documents and Settings\casey\Local Settings\Temporary Internet
Files\Content.
IE5\index.dat
http://preview.ussearch.com/preview/...?&searchLName=Fernandez&searchState=
FL&searchCi
ty=
jacksonville&searchFName=
Zenaida&adID=303014F936&adsource=8&TID=0&cid=
people&searchtab=people
·ð-·newsearch[2]
************************************
Name:
Unallocated Clusters
Description: File, Unallocated Clusters
File Created:
Last Accessed:
Last Written:
Full Path: 08-069208\S013J10X237614\D\Unallocated Clusters
http://searchservice.myspace.com/index.cfm?fuseaction=sitesearch.results&\
qry=
zannie&type=People&srchBy=Name&g=F&
loc=orlando%2
Cfl32829&
minAge=22&maxAge=\
26&d=25
**************************************
Name: Unallocated Clusters
Description: File,
Unallocated Clusters
File Created:
Last Accessed:
Last Written:
Full Path: 08-069208\S013J10X237614\D\Unallocated Clusters
"http://x.
myspacecdn.com/modules/sitesearch/static/js/sitesearch003.js"></script>
<!-- Search - Start -->
<div id="searchContent">
<div id="siteSearch" class="
global">
<input type="hidden" id="fuseaction" queryID="fuseaction" value="sitesearch.results"/>
<div class="searchField">
<input type="text" class="searchFieldInput" maxlength="100" size="35" id="qry" name="qry" que
ryID="qry" title="
Search MySpace" value="
zanny" onkeypress="return keyPressHandler(event, 'searc
hButton');" />
********************************************
Name: Unallocated Clusters
Description: File, Unallocated Clusters
File Created:
Last Accessed:
Last Written:
Full Path: 08-069208\S013J10X237614\
D\Unallocated Clusters
"http://searchservice.
myspace.com/index.cfm?fuseaction=sitesearch.results&qry=
zanie&type=People&
srchBy=Name&g=F&
loc=orlando%2Cfl32829&upic=on&npic=on&
minAge=22&maxAge=26&d=25
************************************************** *********This below will help explain what Unallocated Clusters mean
Unallocated File Space Defined
When files are erased or deleted in DOS, Windows, Windows 95, Windows 98 and Windows NT, the content of the file is not actually erased. Unless DoD certified file deletion software is used, such as NTI's M-Sweep or DiskScrub, data from the 'erased file' remains behind in an area called unallocated storage space. The same is true concerning file slack that may have been attached to the file before it was deleted. As a result, the data remains behind for discovery through the use of data recovery and/or computer forensics software utilities.
Unallocated file space and file slack are both important sources of leads for the computer forensics investigator. The data storage area in a factory fresh hard disk drive typically contains patterns of sectors which are filled with patterns of format characters. In DOS and Windows-based computer systems, the format pattern for a floppy diskette usually consists of binary data in the form of hex F6s. The same format pattern is sometimes used in the format of hard disk drives but the format patterns can consist of essentially any repeat character as determined by the factory test machine that made the last writes to the hard disk drive. The format pattern is overwritten as files and subdirectories are written in the data area.
Until the first file is written to the data storage area of a computer storage device, the clusters are unallocated by the operating system in the File Allocation Table (FAT). These unallocated clusters are padded with format pattern characters and the unallocated clusters are not of interest to the computer forensics specialist until data is written to the clusters. As files are created by the computer user, clusters are allocated in the File Allocation Table (FAT) to store the data.
When the file is 'deleted' by the computer user, the clusters allocated to the file are released by the operating system so new files and data can be stored in the clusters when needed. However, the data associated with the 'deleted' file remains behind. This data storage area is referred to as unallocated storage space and it is fragile from an evidence preservation standpoint. However, until the unallocated storage space is reassigned by the operating system,
the data remains behind for easy discovery and extraction by the computer forensics specialist.
http://www.forensics-intl.com/def8.html
Chilly this little bit of research I posted above took me hours , I wanted to be sure I had my facts straight and could back it up . I hope this clears the question up .