B. You don't do a forensic intrusion investigation by shutting down a single server and moving it.
Modern malware can run just in memory, meaning of shut off the computer to move it, you lose the evidence.
In digital forensics and incident responses, you want to look at the whole network. And you usually have to do this over time to see what the invaders are trying to do.
To do this they use forensic imaging software which basically creates a snapshot of the whole system at that time and you can see what's happening in memory and you're getting the network not just a single server
I don't get why you would have to move a server
They need to keep all their blackmail material safe. They can't destroy it,or they can't blackmail people anymore.
Hopefully the russians take it out with a missile.
Hopefully we capture it and use it as evidence.
No worries
8 Q posts with "We have it all" Trump has said he has it all.
Love all you frens but sometimes it feels like amateur hour around here.🐸
I get that they have it all.
but zero order and first order sources are better than derivative sources.
Good point , thanks
no i want to know what's in there
A. It didn't happen.
B. You don't do a forensic intrusion investigation by shutting down a single server and moving it.
Modern malware can run just in memory, meaning of shut off the computer to move it, you lose the evidence.
In digital forensics and incident responses, you want to look at the whole network. And you usually have to do this over time to see what the invaders are trying to do.
To do this they use forensic imaging software which basically creates a snapshot of the whole system at that time and you can see what's happening in memory and you're getting the network not just a single server