Some alarm bells are going off. If there's a professional service involved, why are you doing anything? Have you asked them what they would suggest so you could do your own analysis?
On Thu, Jun 9, 2011 at 1:24 PM, Jonathan <[email protected]> wrote: > for those of you you do not have content filtering in place, when someone > asks you to analyze a computer to figure out where they've been what > software to use? > > I've used iehist to examine index.dat files but I'm wondering if there is > anything better thats come out since I haven't done this in a year or two. > > free is preferable, but I need to be able to preserve the system as it is > for potential "professional" forensic analysis in addition to my own > analysis. > > Jonathan A+, MCSA, MCSE > > Thumb-typed from my HTC Droid Incredible (and yes, it really is) on the > Verizon network. Please excuse brevity and any misspellings. > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > --- > To manage subscriptions click here: > http://lyris.sunbelt-software.com/read/my_forums/ > or send an email to [email protected] > with the body: unsubscribe ntsysadmin > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ --- To manage subscriptions click here: http://lyris.sunbelt-software.com/read/my_forums/ or send an email to [email protected] with the body: unsubscribe ntsysadmin
