While handling an incident, either in the identification phase or during the computer forensics analysis, it is necessary to analyze the logs from different servers to identify the events that could be related to the incident. This task is often done using regular expressions with a customized list...
Joaquin Moreno
April 29, 2013

All papers are copyrighted. No re-posting of papers is permitted