Link: Windows command line security tricks

Via Bruce Schneier:

Could be used in an audit context to establish what’s running – less use for forensics, obviously

Advertisements

About Peter Cruickshank

Lecturer in the School of Computing and a member of the Centre for Social Informatics at Edinburgh Napier University, Scotland. Interested in information systems, learning, politics, society, security and where they intersect. My attempts at rounding out my character include food, cinema, running, history and, together with my lovely wife, bringing up a cat and a couple of kids.
This entry was posted in Daily Links, Security and tagged , , , , , , . Bookmark the permalink.

One Response to Link: Windows command line security tricks

  1. Cadrian Thomas says:

    My friend and i are doing a research on e- participation for a big presentation. I was just wondering if u could supply us with some information relating to: the information and communication technologies use to facilitate e- participation as well as the privacy, security and ethical issues relating to e- participation.

    THANKS MUCH

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s