Terms to Know
brute force attack | port scanner |
cache | protocol |
connector | router |
Cookie | signature analysis |
covert channel | slack space |
e-mail header | steganography |
IP address | swap file |
MAC time | temporary Internet files |
metadata | trace evidence |
multiboot system | Transmission Control Protocol/Internet Protocol (TCP/IP) network |
packet | Trojan horse program |
UPD Datagram |
Get Computer Forensics JumpStart, Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.