First published November 2004
The following is an extract from Chapter 8 of “Windows Forensics & Incident Recovery” by Harlan Carvey.
Collecting data from a potentially compromised system is relatively simple. There are several methodologies for collecting data that an … Read more