Forensic disk controller: Difference between revisions

Content deleted Content added
Reswobslc (talk | contribs)
m How it works: clarify typical usage scenario
Line 34:
 
[[it:Write blocker]]
one easier of doing forensics is having a bootable usb dongle (probably with some flavor of linux) and then mount the harddisk as readonly of the suspected machine, and do the necessary forensics, this method is quite common nowadays.