티스토리 뷰
If the remote connection or VM is running, do not shutdown the system.
Two way of data acquisition; bit-by-bit, logical.
Hash blacklist will help fast illegal file searching.
'AU Study > CSG2305 Computer Forensics' 카테고리의 다른 글
W7 Mon 10092018 (0) | 2018.09.10 |
---|---|
W6 03092018 Mon (0) | 2018.09.06 |
W5 Mon 27082018 (0) | 2018.08.27 |
W4 Mon 20082018 (0) | 2018.08.24 |
W2 Mon 06082018 (0) | 2018.08.07 |
댓글