You are on page 1of 10

Internet/Web/Computer/Digital Frauds Risk Detection/Protection/mitigation

Identity and Atm Frauds Computer and Digital Investigations
Copyright Violations Intellectual Property Investigations
Downright Criminal Activities Evidence Preservation
Emails Abuse Disasters and files recovery
Money Laundering/Advanced Fee Fraud (419)

Computer & Digital
Forensics

FORENSICS-MONITORING-SURVEILLANCE-SECURITY-AUDITING-ECOURSES-
FRAUDS
Our Computer Forensic Tools Exist in the Form of Computer Software’s

We are information security professionals, with expertise and technological
know-how in the application of analytical and investigative techniques for
conducting LITURGICAL AND NON-LITURGICAL FORENSICS investigations,
examinations, analysis, interpretation, evidence preservation of electronic
data, presentation of comprehensive reports on specific activities or
prosecute same in a court of law.

Our forensics services includes the monitory and surveillance of Pc-based
networks, servers, systems, to extract relevant files of computing and
digital activities that require investigations, examinations, analysis, risk
preventions and mitigation, as well as fraud control measures.

Computer crime, fraud, disaster and risk programming to compromise
business processes, have become very pervasive on the internet, web,
computer system, networks servers, single user Pc (laptops, desktops, etc)
and digital devices (mobile phones, PDA, printer, fax machines, 1 pods,
etc), and as forensic specialists, we assists by offering our services to
companies, corporate ‘IT’ firms, Banks, financial institutions, law
enforcement agencies, to determine by detection techniques, the root
causes of :
 A hacker attack or an intrusion
 Illegal or illicit activities on computing assets
 Theft of information assets or corporate espionage
Our services encompass the investigation, identification, extraction,
examination, analyses, documentation and preservation of computing and
digital evidence, in a admissible, electronically encoded media or physical
storage (files, notepads, documentations, peripherals, visual outputs,
electronic storage media, etc) and to help in the detection and mitigation
of risk protection, defense of corporate assets and reputation, recovering
of files/data/information from intentionally damaged media.

SCOPE OF OUR SERVICES: A brief on scope of our services include:
 Acquisition\collection and seizure of electronic data, files program,

hardware, media, software, etc.
 Investigating the master boot records, master files table, data streams,

partition tables, files storage dates and times.
 Recovering internet usage data, swap files, temporary files, cache files,
deleted files, information system and cell phones
 Uncovering, examination, expert analysis and presentation of forensic

data to relevant security agencies or authorities or courts of law, on
computer and digital assets (CD/DVD/CDROM/hard drive, memory, word
documents, unallocated disk spaces, etc)
 Making of bit stream copies of original media, marking, storage,
preservation and transmittal of evidence
 Application of court-validated tools in conducting digital and computer

forensic service, which will legally empower us to provide depository
and trial testimony in all courts of law, in accordance with legal and
regulatory frameworks for controlling cyber crimes .
 Protection of information assets and security consulting in creation and
implementation of new policies to protect information assets.
WHEN CAN ONE REQUEST FOR OUR SERVICES (DIMENSIONS OF
CYBER CRIME AND FRAUD)
We conduct forensic examinations when there are justifications for the
following complaints:

VIOLATION OF SECURITY PARAMETERS:
This covers inappropriate computing and digital conducts in logging in and
accessing files or information, hacking into secured files, improper use of
security cameras, misuse of passwords and non-adherence to procedures
for handling secured documents. These inappropriate conducts can lead to
theft or misuse of company information or violation of policies and
procedures.

THEFT OF INFORMATION
This warrants our investigation into the theft of sensitive company
information, which may cause a company to loose its goodwill, reputation,
competitive edge or confidential/restricted/proprietary information.

INTELLECTUAL PROPHECY INFRACTION
In this investigation, we examine the loss of ideas, programs, techniques,
procedures, codes, scripts that are proprietary, belonging to a specific
company. And this may occur through exchanges in personnel or staff.

ELECTRONICALLY TEMPERING
We investigate electronic tempering which may occur by means of fraud or
outright theft or mimicking someone/something (Ip spooling) or
masquerading as someone.

EMAIL ABUSE
We investigate inappropriate uses of emails that are not in conformity with
existing computing policies

INTERNET MISUSE
We investigate and evolve strategies for combating illegal, illicit,
inappropriate use of internet times and sites for identify frauds, theft,
espionage, advanced fee frauds, and money laundering.
ORDER FORENSIC SOFTWARE’S
1. Our Computer forensics software suite is available for $1,199.0. This
can be used by windows administrators, computer managers,
information security officers, Network administrators, forensics
consultants, etc. The only required prerequisite is a firm
understanding of windows operating system. Our software suite also
includes license for access data. FTK 2.0, which is the premiere
software package for computer forensics analysis
2. Our digital forensics mobile application softwares/scripts is
available for $1,999.
3. You can request for our contractual forensics services by
completing the request form (click here) to enable us receive
information needed to evaluate your forensics needs. Thereafter,
we will send you our service quotation
WHY CONTRACT OUR FORENSICS SERVICES

The advantage of this contractual service is that your company or agency
can draw from our pool of expertise and technology, which quarantees
accuracy in evidence processing techniques, through he use of our time-
tested evidence processing technologies, procedures and multiple software
tools (developed by us and our third party forensics partners) The contract
makes it our duty to implement a 24hrs daily/yearly risk-and-fraud-repellent
system for your company.

PAYMENTS: Payments can be made via the following bank in
cheque/cash/Atm/credit deposits. Thereafter, we will promptly send you a
download link for the forensics software suit(s) of your choice, or initiate
plans to enable you contract our forensic services.
ACCOUNT NAME: CHUKWUEMEKA NWOSU (BDS NIGERIA LTD)
BANKER: FINBANK PLC
BRANCH: FAULKS ROAD BRANCH, ABA, ABIA STATE, NIGERIA
ACCOUNT NUMBER: 321430000128101
ACCOUNT TYPE: CURRENT

EMAIL: Please email us details of your payments using
Bdsnet2@yahoo.com . On confirmation of your payments, we will and
respond promptly to deliver your orders.
WEBSITES: Http:\\forensicsandsecurity.weebly.com
www.digitaljewels.net , www.bdsnet2security.350.com
EMAIL: Bdsnet2@yahoo.com
MOBILE: 2348036775120, 2347028829996

WHO NEEDS OUR SERVICE AND PRODUCTS:
Domain Attorneys, Law Enforcement Agents, Police, SSS, EFCC, ICPC, FRCS,
Customs, Immigration, Armed Forces(Military, Navy, Air force), Government
regulatory agencies(CBN, NITDA, NIC, NASB, SEC, INE; NIMC, NSE),
Governments(Federal, State, Local), Bank Inspectors, Auditors, Accountants,
Information Technology, Practitioner Security Consultants, etc .

E-MANUAL E-COURSE MODULES PRICES
(COVERING CISSP)

Affiliate and foundation Digital and computer E-Book version:
Examination crimes legal framework for N5,500.00
introduction to forensics law-investigations Hardcopy: N7,500.00
computer/Digital and ethics. Digital\computer Including course
forensics crime in the internet, cost
networks general over new
of computer forensics tools
an software resources for
computer and digital
forensics operating systems
Professional Digital and computer E-Book: N15,500.00
Examinations Forensics Hardcopy:N12,000.00
(1-3 of CISSP) Operating system
Manual Monitoring tools and
On procedures in forensics
Forensics Surveillance tools and
Monetizing process, analysis tools
Surveillance procedure in forensics
Mitigations examination and analysis
Investigations tools, process in forensics
analysis Legal perspectives in
forensics (law, policies,
regulations). The role of law
enforcements agencies in
forensics evidence recovery,
handing, presentation,
reporting evidence
examination, storages.
Biometrics and handwriting
analysis
E-Manual Ethical shacking E-Book: N15,500,00
On (Penetration testing Hardcopy:N17,000.00
Electronic Auditing, Electronic Auditing (Including Courier
Accounting and fraud Electronic Accounting Delivery)
controls Ethics of Digital and
computer forensics
telecommunications,
Networks Internet and web
security Digital and
computer forensics as a
profession physical
applications and operations
security
E-Payments Issues
Identity theft
Atm Frauds
Internet Frauds
Bank Frauds
Electronic Frauds
Cryptography and
encryptions
Practical Examinations, Recovering Evidential Data DVE/CD Copies:
Testing, Practice (Disaster Recovery) sound N25,000.00
handling and storage of Per Set of
evidence sound Download:
examination and analysis Software’s
procedures Technical, Including N20,000.00
Softwares, Hardwares Issues

ADVERTISE
DESIGN YOUR ADS/ADVERTISEMNET DIMENSION
Go ahead Design your ADS on your own, using the following dimension for
the ADSPACE you wish to buy from this website
125 x 125 Pixels Banner Ads 120 x 650 Pixels
Vertical
150 x 150 Pixels 160 x 160 Pixels
300 x 250 Rectangle 728 x 90 Honzontal
468 x 60
Or use the dimensions that suites your ADS.
If you wish to use our service to design your Ads, visit the Webpage:
WEBCOPYURITERS on this site. Thereafter, send us all relevant information
we can use to do a project web copy for your business Ads and massively
explode traffic to your project Site.

BUY NOW

 Ad files can be in Jpg, png, gif, formats
 Ad files can statuary, simple, scrolling, animated
 Ad to show your Brand
 Ads to link and shows your products/ services page
 Alternative text is to be your product/service name per AD

SPONSORED ADVERTISEMENTS
E-commerce : http://www.BDSINTERNETADVERTING.350.com
Views: 10 million Per Month Information Products
Price: $10,000.00 Per Month View: 5 Million Per month
Contact us: Price: $3,000.00 Per Month
Contact us:

Advertise:http://www.BDSINTERNETADVERTISING.350.com/Home-11.htm/
Views: 10 million per month Blog/Link/News
Price: $10,000.00 Per month View: 5 Million Per
Month
Contact: Price: $3,000.00 Per Month
Contact:

Search/Directory: Web Trafic:
Views: 5 million Per Month Views: 10 million Per Month
Price: $5,000.00 Per Month Price: $10,000.00 Per Month
Contact us Contact us

Webcontenwriting: Web Copy-Promotions:
Views: 1 Million Per Month Views: 5 Million Per Month
Price: $1,000.00 Per Month Price: $5,000.00 Per Month
Contact us : Contact us:

All other sites(prices-payment-contact us-classified A-Ds)
View: 5 Million Per Month View: 10 Million Per Month
Price: $1,000,00 Per Month Price: $1,000.00 Per month
Contact us: Contact us:

There sponsored advertisements can be placed in the top of the webpage
above the fold in the left or right sides and in the down side of the
webpage. Whatever you choose your Ad placement it will receive
conspicuous Display on the webpage

ADVERTISE HERE
PRICE: BUY NOW
1. Do-IT-YOURSEL INFORMATION E-BOOK - N5500.00
2. EXAMPLES-TRICKS-TIPS FOR SUCCES E-BOOK - $100.0/N10,500.00
3. DO-IT-FOR-ME ORDER PACKAGE -
$20.00/N25,000.00
4. TURNKEY BUSINESS ORDER PACKAGE WITH WEBSITE CODES
MEGA-BIZ/WEBSITE -$1500.00/N150,000.00
5. ONE-ON-ONE-TRAINING + EBOOK ORDER PAGE -
$150.0/N20,000.00

BUY NOW
<A Href= “http://www.BDSINTERNETADVERTISING.350.com/Home-12.htm”>
contactus<IA>

CONTACT US: After purchasing your adsiace, Contact us thus:
* Use the keyword BDSIA below.
Your Company :
Email:
Mobile Phone/OTHERS;
Your Product/Services Url:
Your Desired Banner Dimension:
Text ADS for your Banners:Enter Ads Text here
Amount you paid for Ads:
Bank of Deposit:
Bank Account Number of Deposit:
Date of Deposit in Bank:
Bank Deposit Slip Number:
Other payments Gateway Users Here:

Submit: CLICK