Forenzní analýza webovských prohlíže?? ?ást 2.
12.05.2005In part two we now set out to determine who used Joe's machine while he was on vacation. We will proceed by examining further investigative leads that involve performing an in-depth review of the web activity of all other browsers installed on Joe's hard drive.
Zdroj: http://www.securityfocus.com/infocus/1832Autor: JP