Hey Irongeek - I always thought it made sense to use it for such as you speculate, but I have never seen it used in the wild, and I don't know of anyone who has. Maybe someone else will chime in on it?
On Sat, Aug 15, 2009 at 2:46 PM, Adrian Crenshaw <[email protected]>wrote: > Quick question about Host-Protected Areas and Disk Configuration Overlay. > How useful is it for anti-forensics in your opinion? Some forensics tools > can see it as I understand , and I'm not sure how someone can conveniently > mount the area for copying data to and from. Opinions? > > Adrian > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
