Greetings,
You could probably make a determination without deploying spyware. If you grab
the MFT, analysis of it can tell you a lot about the user's activity. Get the
prefetch files and registry hives. Get the various browser caches. Do
traditional forensics .
-David
On May 25, 2013, at
gt; system/network?
>
> Aaron
>
> On 7/20/12 7:29 PM, David Kovar wrote:
>> Good evening,
>>
>> A mid-sized high tech client got a new CEO a few months ago. Since coming on
>> board, he's received a steady stream of probe email addresses from a wide
>>
Good evening,
A mid-sized high tech client got a new CEO a few months ago. Since coming on
board, he's received a steady stream of probe email addresses from a wide
variety of throw away email address. The addresses are most often Gmail
accounts with random letters for the name and for the addr
: [Pauldotcom] Linux prototype board with Firewire?
>>
>> I think you are going to find this difficult. You might want to consider a
>> small form factor pc board. You should be able to find one with FireWire
>> without too much effort.
>>
>> Jim
>>
>> O
ble to find one
> with FireWire without too much effort.
>
> Jim
>
> On Monday, 16 May 2011, David Kovar wrote:
>> Greetings,
>>
>> I'm trying to locate a prototyping kit for a small Linux hardware solution.
>> The catch is that it needs a firewire i
Greetings,
I'm trying to locate a prototyping kit for a small Linux hardware solution. The
catch is that it needs a firewire interface, and I've been unable to find such
a beast.
And this is a security related project
-David
___
Pauldotcom maili
You can do it with PhotoRec. The name is somewhat misleading.
-David
On Mar 16, 2011, at 5:36 PM, Brett wrote:
> I've used backtrack to recover files
>
> Sent from my iPhone
>
> On Mar 16, 2011, at 8:19, Juan Cortes wrote:
>
>> Guys,
>>
>> is there a way to recover office files. I download
Greetings,
Adobe Acrobat Pro will do this. One reason for using Acrobat is that
it'll turn everything into a PDF, which is useful with dynamic content.
HtTrack is the other option I use.
-David
On Feb 7, 2011, at 3:53 PM, Juan Cortes wrote:
> Hope all is well guys!
>
> I know there's such to
Greetings,
This policy is becoming standard in a lot of corporations. I think the
powers that be have more market research for their point of view than
you can drum up for yours.
-David
On Jan 18, 2011, at 10:19 AM, Craig Freyman wrote:
I agree that the policy is very bad and Bugbear is 1
convinced to head up that way for a meet-up sometime.
KP
On Thu, Jun 3, 2010 at 4:59 PM, David Kovar wrote:
Greetings,
Is anyone on this list located near Bloomington-Normal and interested
in getting together occasionally for shop talk etc?
-David
__
Greetings,
Is anyone on this list located near Bloomington-Normal and interested
in getting together occasionally for shop talk etc?
-David
___
Pauldotcom mailing list
Pauldotcom@mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinf
Greetings,
I think it depends on your previous experience, study habits, and test
taking ability. I test well (ie, do well on standardized tests) and
had been working in IT and software engineering for 20 years when I
took the test. I prepared only with the CISSP book. I'd read a chapter
a
Ironkey's support for non-Windows platforms is sorely lacking.
TrueCrypt is what I tend to use for securing a variety of portable media.
-David
On Tue, May 11, 2010 at 1:48 PM, iamnowonmai wrote:
> Ironkey
>
>
> Michael Miller wrote:
>
>>I'm a bit skeptical about flash drives and hard drives
Greetings,
I just bought one of these but in the USB/eSATA configuration. I am
*quite* happy with it. I've not cracked it open to determine how
secure the data really is though.
It is compact, relatively rugged, fast, and works on every system I've
needed to plug it into. And it was relatively in
Greetings,
There are various tools that use a servlet running with administrator
rights on the various targets controlled by one or more management
systems. You can purchase the software or you can contract with the
company to lease you the software under a professional services
arrangement if thi
Greetings,
I work on Mac, Windows, and Linux. I tend to use a variety of tools
depending on the platform, the nature of the engagement, and whether I
was first on scene.
No matter what tools I use, I plan on writing up a final report, most
likely from scratch. If I've done my ongoing documentatio
oll
>>
>> On Tue, May 25, 2010 at 6:25 PM, Raffi Jamgotchian
>> wrote:
>>> Companies aren't really open about when they got pwned even when it's
>>> scrubbed
>>>
>>> On May 25, 2010 8:38 AM, "David Kovar" wrote:
>>>
Good morning,
I am focusing on my reading to broaden my awareness of the types of
attacks and the nature of the people doing them. I've recently read
Fatal System Error and the Art of Intrusion, along with the Defcon 17
Malware Freak Show slides as well as a lot on the Google attack. The
books wer
Greetings,
Timestamps are one clue to a subject's activity but are rarely the
smoking gun, for many reasons. They can be intentionally modified,
various automated processes can update them, the system's clock may be
off (intentionally or accidentally), various actions may not preserve
them,
19 matches
Mail list logo