Quick question about Host-Protected Areas and Disk Configuration Overlay. How useful is it for anti-forensics in your opinion? Some forensics tools can see it as I understand , and I'm not sure how someone can conveniently mount the area for copying data to and from. Opinions?
Adrian
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
