Traditionally, computer forensic investigations focused exclusively on data from the seized media associated with a system of interest. Recently, memory...
Lenny Zeltser talks about TreasureHunter (md5: 070e9a317ee53ac3814eb86bc7d5bf49), that uses the Windows Product ID to generate the mutex used to verify...
Persistence mechanisms are techniques used by malware to increase survivability on compromised host systems. For an incident responder, the identification...