WEBCAST: Live Forensics & Memory Analysis

John Strand // So you think you might have a compromised Windows system. If you do, where do you start? How would you review the memory of that system? What are the first 10 commands you’d run to see if it’s actually compromised? This webcast is based on SANS 504, and introduces attendees to some […]

Read the entire post here