Cover photo
Allen Taylor
Works at Taylored Content
Lives in York Springs, Pa.
2,578 followers|157,312 views


Allen Taylor

Shared publicly  - 
The key to Ruth Ross’s success as an author is her relationship to her publishing partner, Authority Publishing. She left a cozy corporate career to tell her own story in a unique and fascinating way, and she proves that you don’t have to know anything about writing or publishing to get started–and succeed–as an independent author.
Add a comment...

Allen Taylor

Shared publicly  - 
The best content about content. In this issue:

* Why fashion and food are better than cute kittens
* The future of media
* Mark Coker on Amazon Unlimited payouts
* The nonfiction genre in the top 5 money-makers
* Why lawyers should publish electronic casebooks
* Amazon's first physical book store
* How Stephanie Chandler creates authority with e-books
* Are banks declaring war on startups?

And much more
<>, French flag As we entered the weekend, terror struck the friendly French capital known as Paris. My Facebook wall was plastered with condolences, shows of support, and memes related to the event. I had my head mired in trying to get my new laptop computer to work the way I want ...
Add a comment...

Allen Taylor

Shared publicly  - 
There are many ways to do e-mail marketing. If you listen to the gurus, they’ll want to enroll you in some course to teach you the many-faceted ways to do e-mail marketing their way. But I’ve learned a thing or two about gurus. Their way is not the best way for everyone. Sure, there may be a handful of people who can benefit from doing e-mail marketing the way a specific superstar does it, but there will be just as many for whom that particular superstar’s methods just won’t work, and the reason all boils down to personality.
Add a comment...

Allen Taylor

Shared publicly  - 
A lot more detail than I ever expected. This is good information for attorneys and anyone interested in knowing about securing your digital information.
10 Things Attorneys Should Know About Digital Forensics

Nowadays, the great majority of legal cases involve a digital component that, if properly uncovered and examined, has a great chance of helping your case. An examination can reveal a number of interesting things. The scope and cost of the analysis often depends on the nature of the case, so it is very important for the Forensic Examiner to have a clear understanding of what the case is about.

I often get asked questions like:

What is forensics?
How can computer forensics help my case?
Why do we need a forensic image when we can have the IT guy create a copy of the hard drive?
Your legal team may already be asking some of these questions.

My goal with this article is to help you identify the 10 most common applications and elements of a properly executed forensic application strategy, and how it can positively impact the outcome of your legal cases.

So let’s go!

1. What is Computer Forensics or Digital Forensics?
Computer Forensics/Digital Forensics is a science involving the recovery and investigation of items found in electronic devices, usually involved in crimes or corporate investigations. A forensic examination can be done on any of the following: computers, laptops, external hard drives, thumb drives, memory cards (such as the ones found in smart phones and digital cameras), CD’s, DVD’s, cell phones, tablets, and GPS systems. Basically, if it is digital and stores memory, it should be able to be examined.

2. Forensic Imaging
A forensic image, or bit-by-bit copy (as it’s referred to at times) of the device being examined should be the first step taken before any examination or analysis begins. It is a read-only image of the entire hard drive or device: it includes all the files and unallocated or un-used space of the hard drive. A forensic image is done by using either hardware duplicators or software.

Sometimes, when encryption is involved (discussed next), it may be necessary to do a “live forensic image.” A live image is done by making a forensic image of the computer while it is still turned on and logged into by the user.

3. Forensic Copy
A “forensic copy” is used to collect and preserve active files and is an exact, unaltered copy of the data, including original file metadata. A forensic copy may be used to preserve data from a users’ home share on the server, or now with the use of the cloud being so popular, preserving a forensic copy of the data in question.

The downside to a forensic copy is that you will not be able to capture deleted files or information; it only applies to the active files or the files you can see.

4. Encryption
Encryption is when data is converted into a format that is not easily accessed without some sort of password or key. This is something that is often overlooked. If encryption is being used, the examiner will need the key to decrypt the image.

If the key cannot be made available, it will be necessary to do a live forensic image since the data is already decrypted. Many companies and individuals are using encryption as an added layer of protection on their devices.

While this is a great way to secure the data, it poses a layer of difficulty for forensics if the type of encryption is not known and/or the key is not made available. Some popular encryption software include McAfee’s SafeBoot Encryption, Symantec’s Endpoint Encryption, and PGP Whole Disk Encryption. Windows and Apple OS both have built-in encryption options which are not active by default but can be turned on: Bit-locker (Windows) and File Vault (Apple).

5. Deleted Files vs Deleted Overwritten Files
The device or media being examined will likely contain deleted files. A forensic examination can determine a list of deleted files and deleted overwritten files. Deleted files, for the most part, can be recovered in full.

When a file is deleted, the portion of the hard drive that the file resided on is marked for deletion and is considered “unallocated space.” Once the operating system writes to that area, the file becomes overwritten. Deleted overwritten files may not be fully recoverable.

The lack of deleted files on a device or hard drive being analyzed, can be a sign of data wiping, operating system re-installation or some other type of concealing data.

6. Unallocated Space
With every forensic image, there is an unused portion of the hard drive called “unallocated space.” Unallocated space can contain portions of data or files that have been deleted.

When the operating system reuses this space to write new data, that previous file is no longer available for recovery, however, a portion may still be available if the new data is smaller than the previous data. In other words, if a five page document is deleted, and overwritten by a 3.5 page document, you may still be able to recover the 1.5 page difference from the original document. This process is called “carving,” or “carving unallocated space.”

7. Link Files (.lnk)
Depending on the nature of the case, .lnk files may be of interest. It shows that the file was present and/or accessed at some point on that system even when it may no longer exist or was deleted. A .lnk file is a shortcut file pointing to an application or a file.

This file is created by the operating system or the user and holds valuable information, such as:

The original path or location of the file.
File metadata (creation, accessed, and modification dates).
File size.
File location—whether on a network share, volume name, local drive, or external device such as a thumb drive or external drive.
Which brings us to the next item, external devices.

8. External Devices
A forensic examination can reveal what external devices were connected to the computer or laptop in question. Basically, they leave a bread crumb trail to other devices which may have been missed and can include potential evidence.

Some devices, such as some external hard drives, display the make and model of the device. Some will even show the serial number of the device, making it easier to request that device for further analysis.

9. Metadata
What is metadata? Metadata is data about data. For starters, it shows creation, accessed, and modified dates and times. Using specific tools, some documents can show the author or creator of the data, the number of revisions it underwent, and the last time it was printed.

For pictures and images, it can reveal the device the picture was taken with, as well as the date, time, and the location it was taken. For example, if you have an iPhone with location services enabled on the camera, every picture you take will hold the coordinates of where that picture was taken.

10. Pricing
This is one of the most asked questions I receive. As mentioned above, computer forensics is a science. A forensic analysis takes time. Ongoing training is a must in order to keep up with technology today. We understand this, but have found a better way for all lawyers—including small or solo firms—to utilize forensics in their cases.

We have seen rates from other Digital Forensic firms ranging from $190/hr to $365/hr. These rates can sometimes create limits, and makes it very difficult for small or solo firms to use this service. This is why my company, Detekted, has adopted a Flat Fee Forensic Analysis policy. Where, for a flat fee, we will complete your analysis. This reduces the surprise phone calls of requesting approval more time at an hourly rate.
View original post
Add a comment...

Allen Taylor

Shared publicly  - 
Read the Back to the Future of Content issue, with great content that will rock your world: Featuring:

* Is LinkedIn biased?
* How freelance writers can diversify their income
* What Amazon is doing to fake reviewers
* Why you should quote rock lyrics only if you're rich
* Why traditional authors are going indie
* How long-form content is good for business
* Memoir as pulp fiction
* Brain scans can identify future serial killers
* Top 5 FinTech funding rounds
* 40 IT ops experts to follow on Twitter

and a ton more (including a case study on a nonfiction author that uses e-books to build brand authority)!
<>, subway train in Germany The trains MUST run on time. And so must your content. This week, we're tackling some weighty issues in business, publishing, science, content marketing, literature, and for freelance writers. In fact, you could call this issue the Back to the Future of ...
Add a comment...

Allen Taylor

Shared publicly  - 
What is the secret to smart content marketing? Who should you follow on LinkedIn? How do you build an online audience for your books? All of these questions and more are answered in this issue of The Content Letter.
Add a comment...
Have him in circles
2,578 people
mario mark's profile photo
RAHUL MAKVANA (.I.T. ENGINEER)'s profile photo
James Pruitt's profile photo
david mooname's profile photo
A Cooper's profile photo
hamed tavakoli's profile photo
Geoff Lynas's profile photo
I love nature's profile photo
Robert Bevins's profile photo

Allen Taylor

Shared publicly  - 
Great content on 

* improving conversion rates
* Why smart people act stupid
* Using pre-orders to join the best seller list
* Why one guy owes E-trade $100K
* The short story vending machine
* The country banning female genital mutilation
* Is gene editing safe?
* The emperor of the United States
* Will augmented reality be the next tech revolution?
* 10 tools for real estate developers
* The future of ghostwriting

And a whole lot more!
<>, Buying a car can be a lot of fun or it can be a huge hassle. This morning, I got up and bought a car, got it titled and tagged, and I'm on the road again. Just an hour of my time and I'm done. That's the way I like it. treat your marketing like a 57 Chevy ...
Add a comment...

Allen Taylor

Shared publicly  - 
We've come to the point in history that ghostwriters, like it or not, are accepted, and maybe even appreciated. Some of the best works in history might not have been written were it not for the ghost hiding in the shadow. John F. Kennedy's Profiles in Courage won the Pulitzer Prize. When some readers found out it was ghostwritten, you'd have thought the president left a stain on a blue dress. Years later, we'd only wished the man who did had not written his own memoir (did you fall asleep too?). Today, that dress is worth $1 million. The memoir isn't.
Add a comment...

Allen Taylor

Shared publicly  - 
What Title III of the JOBS Act of 2012, pass this past Friday, means to you and me. Also, Meg Whitman on her new job, investing in Mark Zuckerberg, how to get your self-published books into book stores and libraries, and a case study on how successful nonfiction author Stephanie Chandler creates authority.
<>, crowdfunding investing Something very significant took place on Friday that will change a few things in matters of law and finance. The Securities and Exchange Commission voted to change the rules on who can invest in startup companies, and the rules are a huge game changer.
Add a comment...

Allen Taylor

Shared publicly  - 
Stephanie Chandler has a unique story to tell among nonfiction book authors. She is a traditionally published author with nine titles under her belt who decided to publish her own books as a way to boost her authority and seek the benefits of authorship beyond profits and revenues. She publishes in print and e-book formats and considers both to be equally important. In many ways, she’s the ideal case study subject.
Add a comment...

Allen Taylor

Shared publicly  - 
The Content Letter is back and better than ever, with great content on

* Vegan celebrities
* Fintech
* Book marketing
* Salary negotiations
* Suing Uber
* Smashwords e-book distribution
* Plagiarism
* Blogs for startups
* Google and content re-publishing
* China's middle class
* What Paris does with abandoned subways
* Parallel worlds
* Mobile app development

And a ton more!
Add a comment...

Allen Taylor

Shared publicly  - 
An article, in the sense that I am using the word here, is organized in such a fashion that the reader understands there is a certain logic to its layout and framework. Not all prose and not all nonfiction is laid out in a linear fashion, nor are all articles. But there must be some structure to the form that the reader can follow a line of reasoning and understand that the author is communicating something of vital importance to the reader.
Add a comment...
Have him in circles
2,578 people
mario mark's profile photo
RAHUL MAKVANA (.I.T. ENGINEER)'s profile photo
James Pruitt's profile photo
david mooname's profile photo
A Cooper's profile photo
hamed tavakoli's profile photo
Geoff Lynas's profile photo
I love nature's profile photo
Robert Bevins's profile photo
Map of the places this user has livedMap of the places this user has livedMap of the places this user has lived
York Springs, Pa.
Dallas, Texas - Tacoma, Washington - Waco, Texas - Indianapolis, Indiana - Iraq
Author. Journalist. Editor. Publisher
Full-time freelance writer. Published author. Fiction writer, poet, essayist, award-winning journalist, and Web content writer.

I have written more than 10,000 blog posts and edited more than 30,000. Chief editor and publisher at Garden Gnome Publications.

Add me to circles that pertain to

  • Literature
  • Fiction
  • Poetry
  • Internet marketing
  • Small business marketing
  • News and journalism
Or anything related.

Follow my
Weird Lit Page

I manage a Weird Lit page exclusively for weird lit lovers. If you like Bizarro fiction, New Weird, Absurdism, surrealism, irrealism, or experimental texts, then join us.

UnInteresting Bidtits

I've never participated in NaNoWriMo, though I don't judge people who do/have. I won't be participating this year either. It's just not me. But if you want to add me to your NaNoWriMo circle, I won't hold it against you. :-)

Reasons I might not circle you

  • I find no clues about what kind of content you like
  • Your profile isn't filled out
  • You don't have any public posts
  • The public posts you do have and that I can read don't show that we have anything in common
  • All of your posts are self-promotional
  • You have a branded company account, which is clearly against Google+ guidelines
  • More than likely, if I don't add you to a circle, it's because of a combination of these factors. So fill out your profile, share some interesting posts, and show me a little something about yourself.

Bragging rights
Thrice consecutive winner of the Stephen Philbin Award for Excellence in Legal Reporting by the Dallas Bar Association; Poppy to 3 awesome grandchildren, "Dad" to 3 incredible young ladies, and 3 is my favorite number.
Internet Publisher, Freelance Writer
Writing, editing, WordPress setup and design, business management, storytelling
  • Taylored Content
    Owner, 2013 - present
    Freelance content writer, ghostwriter, and blogger. I create unique premium content designed to get other noticed.
  • Garden Gnome Publications
    Writer, Poet, Publisher, 2005 - present
    Published fiction writer and poet. Take submissions, read work, and publish what I like from others.
  • Curved Marketing
    Chief Operations Officer - Overlord of the best content creators on the planet, 2011 - 2013
    Chief Operations Officer. Managed blogs, articles, social media, website content creation, and various online marketing processes for the business and our clients.
  • Taylor and Associates
    Internet Marketing Consultant in Adams County, Pa., 2012
    Local Internet marketing consultant for small businesses.
  • Blog Content Provider
    Content Production Manager, 2006 - 2010
    Managed blog content ghostwriting for a variety of clients in a variety of industries.
  • Article Content Provider
    Content Production Manager, 2006 - 2006
    Managed the article marketing process for clients.
  • U.S. Army - served in Iraq
    Battle Captain, 2004 - 2005
    Battle Captain. Served as eyes and ears of the battalion commander and supervised staff of enlisted men who collected information from our area of operations and routed it to the appropriate department within the battalion for action. Managed the information hub for the battalion around the clock.
  • Today Newspapers
    Editor In Chief, 2000 - 2004
    Researched and wrote news, feature, and sports articles for weekly community newspaper. Also assigned articles to staff writers and photographers. Attended public meetings and reported on them. Edited the newspaper and laid out each edition before sending it to the press for production. Wrote columns and editorials. Won major and minor industry awards.
  • Texas National Guard
    Armor Officer, 1997 - 2005
Basic Information
Other names
Allen Taylor's +1's are the things they like, agree with, or want to recommend.
The Content Letter, Volume 2, No. 33

, content marketing Changes can be good or not so good, depending on your reasons for making them, the execution, and the perception of thos

The Content Letter, Volume 2, No. 31

, content marketing vs. content publishing I'm on a mission to get content marketers to change their mindset just a tad. I've watched online

How I Got to Write a Regular Column -- After My Article Was Rejected

Want to write a regular column? Here's how one freelance writer made it happen -- after a total failure.

e-Book Cover Design Awards, April 2015 — The Book Designer

e-Book Cover Design Awards, April 2015 including Simon Avery, Jen Fraser, Kit Foster, Damonza, and many more

A Night Among the Utes by Matthew J. Barbour

Strange things happen in the mountains, as this local legend will show you. Don't go out at night.

The Content Letter, Volume 2, No. 14

, rocket pre-launch One day till launch. E-book Publishing: Create Your Own Brand of Digital Books launches tomorrow at Amazon, Barnes &amp; Nob

Can E-books Be Used for Lead Generation?

The short answer is yes, but read this post to learn how to use those ebooks you've written or plan to write to generate leads.

I called these guys and they came out the next day. They were right on time and gave a good estimate. Super proficient in cleaning up my mess and disposing of it properly. I would definitely use their service again.
Public - 4 months ago
reviewed 4 months ago
I grew up in Texas and consider myself somewhat of a connoisseur of authentic Mexican food. Tanias Mexican Restaurant is one of the best Mexican food restaurants in the area. The food is excellent.
Public - a year ago
reviewed a year ago
T.J. Rockwell's is one of the nicest restaurants in this area. At least, that I've seen. I live in Adams County - Latimore Township to be exact - and we have to drive a good ways to eat nice food at a reasonable price. Being from Dallas, Texas originally, T.J. Rockwell's reminds me of the type of restaurants I would eat at on a regular basis, but those restaurants are few and far between in Adams County. You have to go to Gettysburg, York, or Harrisburg. I'm speaking more specifically about atmosphere, though the food at T.J. Rockwell's is good and not overly expensive. The service can sometimes be slow, but the wait staff is courteous and friendly.
• • •
Public - 4 years ago
reviewed 4 years ago
I love this little Irish pub. The wait staff are cordial and fast (most of the time). The food is awesome and the atmosphere is friendly and welcoming.
Public - 4 years ago
reviewed 4 years ago
11 reviews
Being from Texas where steak is the state food, it's not really fair of me to give a review, but I do like Hoss's. It's got a good atmosphere and the prices are reasonable. The food isn't bad.
Public - 4 years ago
reviewed 4 years ago
Flapjacks isn't anything to speak of. The food is cheap so it won't bankrupt you, but you won't write home about it either. The service is a little shoddy. I probably wouldn't go back there except that I attend a monthly group meeting there. I wouldn't recommend it, but it's not so bad that you'll get sick.
Public - 4 years ago
reviewed 4 years ago
I love the Ragged Edge. Good sandwiches and good coffee. Above all, it's a nice friendly atmosphere with great monthly poetry readings a little artwork with style.
Public - 4 years ago
reviewed 4 years ago