Back to list
*Note: Email address will appear as "user domain ext" to prevent harvesting.
RE: P2V - Live Forensics
Feb 18 2011 12:49AM
Greg Kelley (gkelley vestigeltd com)
In those types of situations, I usually walk into the company unknown to
most. Someone with IT typically picks up the person's computer
informing them that it is needed for a couple of hours to perform an
upgrade of some hardware (memory) or software (anti-virus). Then I have
the time to perform t...
[ more ]
Copyright 2010, SecurityFocus