Some alarm bells are going off.  If there's a professional service involved,
why are you doing anything?  Have you asked them what they would suggest so
you could do your own analysis?



On Thu, Jun 9, 2011 at 1:24 PM, Jonathan <[email protected]> wrote:

> for those of you you do not have content filtering in place, when someone
> asks you to analyze a computer to figure out where they've been what
> software to use?
>
> I've used iehist to examine index.dat files but I'm wondering if there is
> anything better thats come out since I haven't done this in a year or two.
>
> free is preferable, but I need to be able to preserve the system as it is
> for potential "professional" forensic analysis in addition to my own
> analysis.
>
> Jonathan A+, MCSA, MCSE
>
> Thumb-typed from my HTC Droid Incredible (and yes, it really is) on the
> Verizon network. Please excuse brevity and any misspellings.
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ---
> To manage subscriptions click here:
> http://lyris.sunbelt-software.com/read/my_forums/
> or send an email to [email protected]
> with the body: unsubscribe ntsysadmin
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

---
To manage subscriptions click here: 
http://lyris.sunbelt-software.com/read/my_forums/
or send an email to [email protected]
with the body: unsubscribe ntsysadmin

Reply via email to