Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: 8lgm; Keyword(s):

Search: Search took 0.01 seconds.

  1. Thread: Desperate

    by 8lgm
    Replies
    14
    Views
    2,883

    Correct we had a HP laptop with a bios...

    Correct


    we had a HP laptop with a bios password, they emailed me a document which i had to read and get signed by my boss. Then i was given a number to speak to HP tech support and then they...
  2. Thread: Desperate

    by 8lgm
    Replies
    14
    Views
    2,883

    HI I also had the same problem witha bios...

    HI

    I also had the same problem witha bios password protection problem.

    I spoke to hp and they emailed me a form asking for details of the company and they then sent me a password which worked...
  3. Thread: Core Impact

    by 8lgm
    Replies
    3
    Views
    1,113

    Ok I have been using version 5 for about 4...

    Ok

    I have been using version 5 for about 4 months ... it doesnt support freebsd at the moment although there are plans to change that in the future... the updates from them is very good and...
  4. Thread: Core Impact

    by 8lgm
    Replies
    3
    Views
    1,113

    Core Impact

    I was wondering whether any users had experience of using core impact penetration tetsing software.

    We have purchased a copy of the latest version and have started using the software in house to...
  5. Replies
    8
    Views
    2,057

    ok point taken 8lgm

    ok

    point taken

    8lgm
  6. Replies
    8
    Views
    2,057

    HI there Encase is the preferred tool that we...

    HI there

    Encase is the preferred tool that we use and yes it is expensive , but when used with other tools such as FTK, Histex and net analysis the results are usually clear and consise.

    The...
  7. Replies
    8
    Views
    2,057

    Forensic procedures

    Hi

    Thanks for that Deeboe

    Yes i agree with your statement about more detail required it was meant as a checklist and i will be producing a more detailed checklist including the scripts ran and...
  8. Replies
    8
    Views
    2,057

    Forensic Procedures

    This is our tried and tested procedures when conducting a forensic analysis using our preferred tools which include encase ver 4.22a , AccessData forensic toolkit and various other tools.

    1 -...
  9. Replies
    8
    Views
    2,057

    Forensic Procedures

    Hi

    if anyone is interested i have produced a forensic checklist that i can post to the forum

    let me know

    8lgm
  10. Replies
    17
    Views
    3,630

    Acquiring evidence files using disk cloning techniqiues

    HI

    i was reading your post on disk cloning... I would just like to point a few things out as this is what i have to do day in day out..


    1 where possible removed the suspect disk and use...
  11. Thread: Hello Everyone

    by 8lgm
    Replies
    0
    Views
    1,021

    Hello Everyone

    I am looking forward to passing on my knowledge and also gaining knowledge regarding computer security. I predominantly work in computer forensics, but have been intrigued by computer security for a...
Results 1 to 11 of 11