منابع مشابه
Messenger Forensics on Windows Vista and Windows
The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducte...
متن کاملYahoo! Messenger Forensics on Windows Vista and Windows 7
The purpose of this study is to indicate several areas of interest within the Yahoo! Messenger application that are of forensic significance. This study will mainly focus on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. The previously condu...
متن کاملMessenger Forensics on Windows Vista and Windows 7
The purpose of this study is to identify several areas of forensic interest within the Yahoo! Messenger application, which are of forensic significance. This study focuses on new areas of interest within the file structure of Windows Vista and Windows 7. One of the main issues with this topic is that little research has been previously conducted on the new Windows platforms. Previously conducte...
متن کاملCore system event analysis on windows vista
Event Tracing for Windows (ETW) has been the key instrumentation technology on Windows platforms for years. Many core operating system components have been instrumented with ETW, providing a basis for system activity analysis and problem diagnosis for a number of developers and tools. The upcoming Windows Vista ® operating system contains many new events, in response to the growing need to diag...
متن کاملAnalysis of the Windows Vista Security Model
This paper provides an in-depth technical assessment of the security improvements implemented in Windows Vista, focusing primarily on the areas of User Account Protection and User Interface Privilege Isolation. This paper discusses these features and touches on several of their shortcomings. It then demonstrates how it is possible to combine these attacks to gain full control over the machine f...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Revista chilena de pediatría
سال: 2007
ISSN: 0370-4106
DOI: 10.4067/s0370-41062007000400013