[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: how to find trace of attacks



> subscribe to).  Then take a complete copy of the HDD, now you can
> mount the HDD in read-only mode in another computer (one that is
> guaranteed to not have been broken into, i.e. a newly installed system
> that isn't connected to the internet).  After that you need to start

You can use a LiveCD to boot, mount and investigate your hard disk as
read-only too.


Koh Choon Lin


Reply to: