tag:blogger.com,1999:blog-9518042.post1857371171830960386..comments2024-03-19T07:46:20.437-05:00Comments on Windows Incident Response: HowTo: Investigate an Online Banking Fraud IncidentUnknownnoreply@blogger.comBlogger3125tag:blogger.com,1999:blog-9518042.post-32910004735608618252013-09-04T12:12:09.084-05:002013-09-04T12:12:09.084-05:00Great how to, thanks for sharing!Great how to, thanks for sharing!Matthttp://protectasecuritysystems.com/security/alarm-videos/noreply@blogger.comtag:blogger.com,1999:blog-9518042.post-37402364192107737262013-07-24T18:27:04.661-05:002013-07-24T18:27:04.661-05:00@Anonymous,
I use Rob Lee's timlineling proce...@Anonymous,<br /><br /><i>I use Rob Lee's timlineling processes to identiy when my customer got infected, and from where.</i><br /><br />How so? <br /><br />What do you look for and find after you've created the timeline?H. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.comtag:blogger.com,1999:blog-9518042.post-31343401383947813842013-07-24T17:57:14.746-05:002013-07-24T17:57:14.746-05:00Hey Harlan,
One truism that I've found is tha...Hey Harlan,<br /><br />One truism that I've found is that my customers rarely have robust anti-virus controls or logging of their networks.<br /><br />I use Rob Lee's timlineling processes to identiy when my customer got infected, and from where. <br /><br />Anonymousnoreply@blogger.com