<<< Previous | Next>>> |
Preliminary tasks |
||||||||||||||||||
There are some tasks we have done before starting the investagtion of the compromised system. These actions and informations taked into consideration are :NOTE : ALL the commands that are indicated in the Answers to question are located on a floppy disk. For clarety purpose, the floppy path will not be mentioned in command line listings. |
||||||||||||||||||
|
||||||||||||||||||
|
||||||||||||||||||