I am a writer. I am trying to figure out the best scenario for adding something to someone's computer. If a person had physical access could they change the log files over a long period of time (2 or 3 years) to add files or emails to a computer with correct past timestamps)? Could this be done using Metasploit or is there a better software for accessing MacBook log files?
If the person with the files they wish to add did not have physical access to the computer could this be done remotely with all physical/forensic evidence of the hack removed in the log files?
Free Guide: Managing storage for virtual environments
Complete a brief survey to get a complimentary 70-page whitepaper featuring the best methods and solutions for your virtual environment, as well as hypervisor-specific management advice from TechTarget experts. Don’t miss out on this exclusive content!