Terms to Know

brute force attack port scanner
cache protocol
connector router
Cookie signature analysis
covert channel slack space
e-mail header steganography
IP address swap file
MAC time temporary Internet files
metadata trace evidence
multiboot system Transmission Control Protocol/Internet Protocol (TCP/IP) network
packet Trojan horse program
UPD Datagram

Get Computer Forensics JumpStart, Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.