PaulDotCom mailing list archives
Host-Protected Areas and Disk Configuration Overlay
From: iamnowonmai at gmail.com (iamnowonmai)
Date: Sun, 16 Aug 2009 15:11:05 -0400
Hey Irongeek - I always thought it made sense to use it for such as you speculate, but I have never seen it used in the wild, and I don't know of anyone who has. Maybe someone else will chime in on it? On Sat, Aug 15, 2009 at 2:46 PM, Adrian Crenshaw <irongeek at irongeek.com>wrote:
Quick question about Host-Protected Areas and Disk Configuration Overlay. How useful is it for anti-forensics in your opinion? Some forensics tools can see it as I understand , and I'm not sure how someone can conveniently mount the area for copying data to and from. Opinions? Adrian _______________________________________________ Pauldotcom mailing list Pauldotcom at mail.pauldotcom.com http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
-------------- next part -------------- An HTML attachment was scrubbed... URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20090816/a14a935c/attachment.htm
Current thread:
- Host-Protected Areas and Disk Configuration Overlay Adrian Crenshaw (Aug 15)
- Host-Protected Areas and Disk Configuration Overlay iamnowonmai (Aug 16)
- Host-Protected Areas and Disk Configuration Overlay Dave Hull (Aug 17)
- Host-Protected Areas and Disk Configuration Overlay Jim Halfpenny (Aug 17)
- Host-Protected Areas and Disk Configuration Overlay iamnowonmai (Aug 16)