Description: In this video, we are going to be generating timelines relating to activity on suspect computers. We'll also see a real-life example of a malware attack identified within a timeline.
Latest from the SecurityTube Blog:
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Original Source: http://www.youtube.com/watch?v=PHeUH-yzbE4&list=UUN_fi5RzVQNxSXaEDjVLkoQ&index=1&feature=plcp