Monitoring and capturing the network serves a number of investigative purposes. In addition to monitoring the activity on the infected host system, monitoring the live network traffic to and from the system during the course of running our suspect program is also important. ![]() ![]() Aquilina, in Malware Forensics, 2008 Network Activity
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |