March 24th, 2006, 12:22 PM
On the job experience. No references were used. Forensics (applied to computers) is a relatively new field and there are no real standards at the moment. One book may tell you that their way is the...
December 24th, 2005, 06:40 PM
Thank you Nihil. Indeed there have been many cases where drone armies (botnets) have been hijacked by competing criminal groups. So as you see, protecting your criminal enterprise is very common,...
December 24th, 2005, 01:11 PM
Again, there are many subsets of malware. I would need a 300 page book to cover all of them. Please review the definition of malware. Believe it or not, there are different payloads in different...
December 23rd, 2005, 11:31 PM
Interesting review of the symantecs used to describe the tools. Both tools have hex capabilities and typically I use each for that purpose. However, yes, technically they are debugging tools. I...
December 8th, 2005, 12:35 PM
I use install watch pro to map out behavior (as mentioned in the tut) and the venerable TCPView FileMon & RegMon combo when mapping in real time. Oh and I always have a sniffer running when doing...
December 7th, 2005, 01:53 AM
LOL. Dammit. It must have been rooted when I copied it over to AO.
Seriously though. There was a trailing period inside the URL tag. I removed it and it works fine now.
;)
December 6th, 2005, 10:18 PM
Nope. Not at all Hoggy.
Wasn't aware of the publication but now that you mention it, sounds like a good book if they're doing things my way.
;)
Sure. We can do a co-author forensic deal.
...
December 6th, 2005, 08:16 PM
December 6th, 2005, 07:18 PM
Sorry about the formatting folks. :(
Perhaps a little help from the moderator to fix up my FUBARed formatting?
[EDIT]
Fixed. No action required.
--TH13
December 6th, 2005, 06:07 PM
Overview: (Please Read)
=+=+=+=+=+=+=+=+=+=+=+=+=+
As many of you venture into a pervasive computing environment, it will not be long before
you will be faced with a situation where forensics...