-
It also makes it easier to find the files that have been created, accessed and modified during an attack, and it is able to reconstruct deleted files from raw data found in various hidden parts of a computer's hard disk, such as unallocated space and file slack.
ECONOMIST: Forensic computing studies the anatomy of computer crime
-
When the thrill of being unplugged outweighs the danger of losing essential data, there are a number of technologies that make it easier to back up those files, keep them hidden and even track down the missing computer itself.
CNN: Mobile PCs can be risky on the road
-
Many observers have suggested defensive techniques that deploy TrueCrypt disk encryption with hidden volume partitions or PGP Whole Disk Encryption rendering the entire computer unbootable thereby making even file time and date stamps unavailable.
FORBES: Move up http://i.forbesimg.com t Move down
-
TORwallet has just announced an online bitcoin wallet run as a TOR hidden service (to access the service users must run the onion proxy software on their computer).
FORBES: TORwallet Sparks Trust Without Jurisdiction Debate