Hey Irongeek -
I always thought it made sense to use it for such as you speculate, but I
have never seen it used in the wild, and I don't know of anyone who has.
Maybe someone else will chime in on it?

On Sat, Aug 15, 2009 at 2:46 PM, Adrian Crenshaw <[email protected]>wrote:

> Quick question about Host-Protected Areas and Disk Configuration Overlay.
> How useful is it for anti-forensics in your opinion? Some forensics tools
> can see it as I understand , and I'm not sure how someone can conveniently
> mount the area for copying data to and from. Opinions?
>
> Adrian
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to