outlined the forensic investigation analysis of IP networks and domain names.
This article defined point of concerns of a presence which automatically collects evidences related to the Internet presences, time-stamped these evidences, store the evidences in a neat manner, generate the integrity hash checksum of the evidence and finally produced an official report of the discovered information.