티스토리 뷰

If the remote connection or VM is running, do not shutdown the system.

Two way of data acquisition; bit-by-bit, logical.

Hash blacklist will help fast illegal file searching.


'AU Study > CSG2305 Computer Forensics' 카테고리의 다른 글

W7 Mon 10092018  (0) 2018.09.10
W6 03092018 Mon  (0) 2018.09.06
W5 Mon 27082018  (0) 2018.08.27
W4 Mon 20082018  (0) 2018.08.24
W2 Mon 06082018  (0) 2018.08.07
댓글
Announcement
Recent Posts
Recent Comments
Total
Today
Yesterday
Link
TAG
more
«   2025/05   »
1 2 3
4 5 6 7 8 9 10
11 12 13 14 15 16 17
18 19 20 21 22 23 24
25 26 27 28 29 30 31
Search by month