tag:blogger.com,1999:blog-6447283518071683105.post8358894651149285448..comments2023-04-02T10:17:04.631-04:00Comments on Forensic Incident Response: TechnoSecurity Day 1hogflyhttp://www.blogger.com/profile/00741773109962883616noreply@blogger.comBlogger2125tag:blogger.com,1999:blog-6447283518071683105.post-26330517329983919232008-06-06T22:26:00.000-04:002008-06-06T22:26:00.000-04:00This was in reference to the current trend in ente...This was in reference to the current trend in enterprise forensics software. Just some thoughts I'd had that day considering what separates us from hired goons when we start using rootkit hiding mechanisms in our tools.hogflyhttps://www.blogger.com/profile/00741773109962883616noreply@blogger.comtag:blogger.com,1999:blog-6447283518071683105.post-36489624427360982112008-06-06T19:14:00.000-04:002008-06-06T19:14:00.000-04:00When did it become ok for us to trojan corporate s...<I>When did it become ok for us to trojan corporate systems with "forensic tools" that utilize rootkit hiding mechanisms?</I><BR/><BR/>Huh?H. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.com