Internet action is usually logged through browser history, DNS cache, or maybe a proxy server. This may allow the individual checking the computer to discover which Web-sites had been visited, which lookups have been produced, and which files ended up downloaded. Time is a significant element in these investigations, and http://skylinehackers.com/