Re: [sleuthkit-developers] Some questions
Brought to you by:
carrier
From: Valter S. <vsa...@se...> - 2006-06-21 15:59:48
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 kenshin wrote: > I know that we don't use untruted executable, but normaly we make a copy > of hd > in other and then we analyzed this image in our computer and I trust my > computer :) > Kenshin, but this is not always the case, there are times that we need to analyze a system that couldn't be powered off, so we need trusted binaries for live analysis. Anyways, as Brian already pointed out, compiling sleuthkit as static is optional so your problem is solved here :-) have fun /valter - -- o Valter Santos <vsantola at sectoid.com> o INFOCON Tactical Overview: http://infocon.sectoid.com o o PGP Key ID: 0xE2A4B206 o Fingerprint: 99FA 3D80 4B54 BA70 7DD7 C751 47BA 49BC E2A4 B206 o o Attack is the secret of defense; defense is the planning of an attack. o Sun Tzu, Art of War -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFEmWzAR7pJvOKksgYRAhIXAKC91oSrjzgBLrjjRAuXyH+nr7Y2pgCgiv65 H7rV0GQofgXPE+1dE0mdqoA= =fCen -----END PGP SIGNATURE----- |