God of War: Chains of Olympus Demo Walkthrough
Get the Flash Player to see this movie.
Käyttäjä: Anonymous User
Päiväys: 16.2.2012
Its about time smooene wrote about this. Pisteet:
|
Käyttäjä: Anonymous User
Päiväys: 13.2.2012
Ray,First of all, easimphse the "chain of custody" issue in deposing MdS people. They went into this planning to litigate, so they should observe the highest standard of evidence collection and preservation.Then theres the ISP people. Take the DHCP log custodien through chain of custody and protection from change stuff, more gently, since they did not plan to use the logs in court. Ask about reliability from his point of view, and suggest that keeping material that is not fit for purpose (for litigation) is a waste of everyones time.Take the administrator who handles the Main Distribution Frame (where all the cables come in from outide) through the relation between cable, MAC address, IP address, and account. Ask how a customer or an outsider can get access using an account he does not own. This is where IP hijacking and sniffed or social engineered logon credentials come in.Take a help desk person through complaints and service requests about the possible exploits. Note that you can add their estimates together, since it is unusual that a problem will be noticed by both.It might be better to chat informally with the ISP people, then write a declaration for them to sign.Hugh Pisteet:
|
Yhteensä 3 arvostelua. |