Quick question about Host-Protected Areas and Disk Configuration Overlay.
How useful is it for anti-forensics in your opinion? Some forensics tools
can see it as I understand , and I'm not sure how someone can conveniently
mount the area for copying data to and from. Opinions?

Adrian
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to