McGhee & T Biehn ! Thankyou for putting up your "best" argument.... sadly that is the BEST technical thing you happen to pick............. in this topic to comment about........
-bipin On 1/27/10, McGhee, Eddie <[email protected]> wrote: > and also lol @ maybe USELESS, try making the MAYBE in caps.. > > ________________________________ > From: [email protected] > [mailto:[email protected]] On Behalf Of T Biehn > Sent: 27 January 2010 12:28 > To: Bipin Gautam > Cc: full-disclosure > Subject: Re: [Full-disclosure] Disk wiping -- An alternate approach? > > > No you don't understand, your premise is shit. Research what's already being > done instead of trying to improve what you don't understand. > > lol @ ddos. > > On Jan 26, 2010 11:09 PM, "Bipin Gautam" > <[email protected]<mailto:[email protected]>> wrote: > > Enough noise, Lets wrap up: > > Someone said: "Forensics requires more than merely finding a phrase or > file on a hard drive - it requires establishing the context. If a > court accepts evidence without that context, then the defendant should > appeal on the basis of having an incompetent lawyer." > > So, any evidence/broken-text/suspicious phrases etc found in a > computer "without meta-data" maybe USELESS........... REMEMBER. > > > Having a normal OS with forensic signature ZERO would be a simple yet > powerful project. Programmers??? it isnt difficult work..... few > months, 1 person project. > > Worm defense is smart as well as deadlock at times, the prospective i > presented can be used as a FALLBACK at times. > > > Maybe something like Alice/chatterbox run through the > free/slack/etc... space of your 1 TB harddisk is a intellectual dDoS! > > _______________________________________________ Full-Disclosure - We believe > in it. Charter: http:/... > _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
