AU Study/CSG2305 Computer Forensics
W3 Mon 13082018
Last72
2018. 8. 15. 15:19
If the remote connection or VM is running, do not shutdown the system.
Two way of data acquisition; bit-by-bit, logical.
Hash blacklist will help fast illegal file searching.