-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

You've gotten some good answers so far, but do not forget to secure the
laptop itself.  It would be a shame to have your digital evidence
compromised.  Look into adding Bastille, tripwire, AIDE, etc.  and use
encryption when and where appropriate.  

- - Brad Bemis 



> If you were building a laptop for the purpose of network monitoring,
> sniffing, forensics and security audits, what tools would you put on it?
> Thanks again,


-----BEGIN PGP SIGNATURE-----
Comment: KeyID: 0xB8F26ADD
Comment: Fingerprint: 6E1C D617 CD65 A203 7FD5  4C68 90E7 39F4 B8F2 6ADD

iQA/AwUBPwSgn5DnOfS48mrdEQIEEACeJz5i7wF3NkgBW16YROjWZkpMj5AAn1j+
YZHvj2S8TiBrDtsLz2X81FuY
=oHOH
-----END PGP SIGNATURE-----



---------------------------------------------------------------------------
Evaluating SSL VPNs' Consider NEOTERIS, chosen as leader by top analysts!
The Gartner Group just put Neoteris in the top of its Magic Quadrant,
while InStat has confirmed Neoteris as the leader in marketshare.

Find out why, and see how you can get plug-n-play secure remote access in
about an hour, with no client, server changes, or ongoing maintenance.

Visit us at: http://www.neoteris.com/promos/sf-6-9.htm
----------------------------------------------------------------------------

Reply via email to