UPDATE: Someone pointed out, this being forensic software, it could be very walled off, sandboxed, etc, with no access to the file system, read only or not. The point being, my argument about not DIFF'ing, falls flat if there is no access by the file system. That said, I'm resourceful, I would find a way to dump the file structure somewhere, somehow. That's what they want right? Resourcefulness.
I don't know how many of you are IT guys, but for those that are... what the actual fuck is going on, on that stage?
I thought CodeMonkeyZ was supposed to be some computer savant or some shit... but he doesn't even know Windows? Really? Well, you sound like a lame Linux poseur then.
If you were not watching the same thing I was... they are looking like a group of monkeys trying to fuck a football. That's racist isn't it? Speciest? Monkeyist?
They have (at least) two images of the voting server. (Don't know why they call something that isn't supposed to connect to a network, a server, if anything it's a dumb client)
And CodeMonkeyZ the genius computer savant is strolling randomly through the files.
Bro, you're on international stream... DO SOMETHING!
They have a physicist, an IT guy, and CMZ... and not one of them know what the fuck they are doing up there.
Find the registry files... DIFF THEM!
DIFF the program files, (x86) and program data directories.
DIFF the user directories!
DIFF the FUCKING windows directory!
DIFF FUCKING SOMETHING!
DO AN ACTUAL BIT LEVEL SEARCH FOR STUFF, FFS!
The only hypothesis I can form is:
-
CMZ is a bullshitter, caught out on live stream.
-
They are flexing and flashing the files to scare (stupid collaborators) people into flipping, and aren't actually TRYING to do ANYTHING.
Oh, I'm also bothered by them being flummoxed over what I think I heard them talking about an IIS file from 1997? Uh, yeah. Win NT 4.0 SP1 came out in 1997.
I'm taking notes to ask my son. I love those on this board that know puters. I know enough to get in trouble. That's why I have a thirty year old computer geek for a son. I would love any info any can put out to explain this. I think I understand Forensic copy but if the information is erased doesn't that mess up the back up. What exactly is SOAP that they are talking about? Sorry but when I learned puters it was DOS on Commodore 64 then I just learned basic Windows. Yeah I suck and my son is going to start teaching me Linux next month for my next computer.
And that's a great question, and once again why I question CMZ's abilities, because the second I saw a SOAP reference ("archaic" 20 year old XML messenger system, Simple Object Access Protocol, NOT messenger like chat, but computer control) I would have done a dump of all SOAP files, then I would have done a cross image diff for those soap files. Then I would have seen what type of access and control those files give.
*edit, someone mentioned DIFF might not be available because images might be sandboxed.
Thank you, searching for the acronym I kept getting all kinds of explanations and soap manufactures. Now i can start digging.