tag:blogger.com,1999:blog-9518042.post110726133147278130..comments2024-03-16T07:01:22.721-05:00Comments on Windows Incident Response: Blog topics?Unknownnoreply@blogger.comBlogger1125tag:blogger.com,1999:blog-9518042.post-1107639811005533422005-02-05T16:43:00.000-05:002005-02-05T16:43:00.000-05:00Actually, your blog has been excellent so far. Wh...Actually, your blog has been excellent so far. While I understand the secrecy aspect, I'd be interested in a few real-life scenarios. Maybe explain what you've seen in terms of compromised systems and how you approached them (shutdown vs. live response, etc.). Kind of what <A HREF="http://www.blogger.com/r?http%3A%2F%2Fweblogs.asp.net%2Frobert_hensing%2F">Robert Hensing</A> is doing over at his blog lately, but using tools available to the public domain...<br /><br />Keep up the good work!Anonymoushttps://www.blogger.com/profile/13441809988487585009noreply@blogger.com