Content deleted Content added
m →How it works: clarify typical usage scenario |
|||
Line 34:
[[it:Write blocker]]
one easier of doing forensics is having a bootable usb dongle (probably with some flavor of linux) and then mount the harddisk as readonly of the suspected machine, and do the necessary forensics, this method is quite common nowadays.
|