|−|== How are they more valuable than mount -o ro? == |+|
, is , ,
the with , .
|−|To add value, wouldn't a write-blocker need to be infallible, then *proven* to be infallible? (That is, proven to be as such, within the margin demonstrated by proving compliance with RTCA/DO-178B using Criticality Level 1). [[User:John Crout|johnc]] 17:49, 28 December 2011 (PST) |+|
|−|The question may not be relevant to hardware solutions. A schematic or data flow diagram would be helpful. Many thanks to the folks who created this page. [[User:John Crout|johnc]] 22:50, 28 December 2011 (PST) |+|
Latest revision as of 07:47, 30 December 2011
I am Forensic Computer Analyst, my main job is make computer forensic analyst and make reports from sd cards, personal computer, Mac computer, and telephony.
I am using free tool software like the tools from The Sleuth Kit, also i worked with winhex and enCase, but i prefere free software.