Security Wire Weekly

Jun 5 2008   9:11AM GMT

Threat Monitor: Windows registry forensics guide — Investigating hacker activities

Jessica Scarpati Jessica Scarpati Profile: Jessica Scarpati

The Windows registry can be used as a helpful tool for professionals looking to investigate employee activity or track the whereabouts of important corporate files. In this tip, contributor Ed Skoudis unveils several commands and explains how investigators and administrators can interact with the registry to analyze a compromised system.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: