Difference between pages "Linux Memory Analysis" and "Windows Desktop Search"

From ForensicsWiki
(Difference between pages)
Jump to: navigation, search
(Linux Memory Analysis Tools)
 
(Initial stub)
 
Line 1: Line 1:
==Linux Memory Analysis Tools==
+
{{Expand}}
* [http://pikewerks.com/sl/ Second Look] from [http://www.pikewerks.com Pikewerks Corporation] - This tool can perform analysis of live local and remote memory sources, as well as stored snapshots of memory (physical memory images or hibernate images).  It can be used to detect rootkits and other kernel-hooking malware, as well as obtain forensic information about the state of the system.  It has reverse engineering capabilities, including built-in disassembly and hexadecimal data views, and the capability of modifying target memory.
+
  
==Linux Memory Analysis Bibliography==
+
== See Also ==
* [https://www.usenix.org/events/usenix05/tech/freenix/full_papers/movall/movall.pdf Linux Physical Memory Analysis], Paul Movall, Ward Nelson, Shaun Wetzstein, Usenix 2005 (PDF)
+
 
* [http://cisr.nps.edu/downloads/theses/06thesis_urrea.pdf Urrea, J. M., "An Analysis Of Linux Ram Forensics", Masters Thesis, Naval Postgraduate School, March 2006] (PDF)
+
[[Google Desktop Search]]
 +
 
 +
== External Links ==
 +
 
 +
* [http://www.microsoft.com/windows/desktopsearch/ Official website]
 +
* [http://en.wikipedia.org/wiki/Windows_Desktop_Search Wikipedia entry on Windows Desktop Search]
 +
* [http://en.wikipedia.org/wiki/List_of_search_engines#Desktop_search_engines Wikipedia list of Desktop search engines]

Revision as of 08:07, 4 April 2007

Information icon.png

Please help to improve this article by expanding it.
Further information might be found on the discussion page.

See Also

Google Desktop Search

External Links