Hacker Factor
Home Blog Services Software Presentations Publications About Contact


There are many different types of computer security consultants. There are consultants who will: We not only do that, but we go one step further. At Hacker Factor, we profile the attackers. Were you targeted at random or was the attack specific for you? How many people were involved? What are their skill sets? Where are they from? Did they get what they wanted, or will they be back?

As with conventional forensics, in computer forensics there is the Locard Principle: Every contact leaves a trace. Everything you type, every file you open, every picture you create, and every packet you send says something about you. At Hacker Factor, we develop cutting edge forensic technologies and methods for extracting trace evidence from computer systems, software, and files.