> Also on the point of copying files over the network
> first, correct me if
> I'm wrong but that damages the chain of evidence. 

Now so?  If one collects the necessary info (ie, MAC
times, NTFS ADSs, permissions, full path, etc), hashes
the file (MD5 and/or SHA-1), and then copies the file
over the network using something like 'dd' or type,
and netcat/cryptcat, how is the chain of evidence
broken?  Especially if it's documented?

> Have a look at the
> link below, goes about it a bit long winded but
> essentially shows how to
> clone a hard drive over a network connection.  This
> can be done with
> Windows machines as DD and Netcat can be run from
> floppy on a Windows machine.

I'm not sure what you're getting at...first you make a
reference to breaking the chain of evidence by copying
a file, but then you talk about cloning an os over the
network using dd and netcat.  Wouldn't doing so also
break your chain of evidence, if your reasoning is to
hold?

  


__________________________________________________
Do you Yahoo!?
Yahoo! Shopping - Send Flowers for Valentine's Day
http://shopping.yahoo.com

Reply via email to