skip to main | skip to sidebar

Cloud Architecture and Technology Blog

Cloud, Security, Digital Forensics, UNIX

Monday, November 12, 2007

Solaris digital forensics whitepaper

Evtim Batchev - Solaris Kernel Dissection for Fun and Profit
Sun Blueprints - Digital Forensics

Posted by cmihai at 7:27 PM

Labels: Digital Forensics, Enterprise, Open Source, Solaris, Sun, UNIX

0 comments:

Post a Comment

Newer Post Older Post Home
Subscribe to: Post Comments (Atom)

About Me

My photo
cmihai
I’m Mihai Criveti, Distinguished Engineer at IBM, focused on building scalable AI systems using agents, RAG, automation, and open architectures. I work hands-on with GenAI, multi-agent systems, vector databases, and AI governance—bringing real-world AI into enterprise delivery. This blog explores technical patterns, tools, and innovations in AI, cloud, and developer platforms—grounded, reusable, and open by design.
View my complete profile

Links

  • PCOWunix
  • Syndication - Subscribe to CriveČ›i Mihai - Unixsadm blog (feedburner).

Labels

  • AI (1)
  • AIX (9)
  • AWK (1)
  • Backup (8)
  • BOFH (20)
  • BSD (20)
  • Cisco (7)
  • CloudComputing (1)
  • Clustering (9)
  • Cryptology (9)
  • Data Mining (1)
  • Databases (12)
  • DB2 (1)
  • Debugging (13)
  • Digital Forensics (29)
  • Documentation (1)
  • Elisp (1)
  • Emacs (1)
  • Enterprise (23)
  • GenAI (1)
  • Graphics (3)
  • GTD (1)
  • Hardware (13)
  • HP (1)
  • HP-UX (6)
  • HPC (3)
  • IBM (5)
  • Internet (44)
  • Java (1)
  • LDAP (1)
  • Linux (27)
  • Mac (2)
  • MacOS (1)
  • Mainframe (4)
  • Malware analysis (6)
  • Media (2)
  • Microsoft (74)
  • MVS (1)
  • Networking (33)
  • Open Source (100)
  • OpenSolaris (11)
  • OpenVMS (18)
  • Oracle (12)
  • OS/2 (1)
  • OS/390 (1)
  • Perl (1)
  • QNX (3)
  • Reverse Engineering (1)
  • Revision Control (1)
  • SCE (1)
  • Scripting (25)
  • Security (55)
  • SmartCloud (1)
  • Software Development (24)
  • Solaris (67)
  • Sun (42)
  • Tru64 (2)
  • UNIX (47)
  • Vim (1)
  • Virtualization (36)
  • Vulnerability Assessment (1)
  • WebOS (1)
  • z/OS (1)

Blog Archive

  • ►  2023 (1)
    • ►  September (1)
  • ►  2018 (3)
    • ►  September (1)
    • ►  August (2)
  • ►  2014 (1)
    • ►  November (1)
  • ►  2013 (1)
    • ►  February (1)
  • ►  2012 (1)
    • ►  October (1)
  • ►  2011 (6)
    • ►  December (2)
    • ►  October (1)
    • ►  May (3)
  • ►  2010 (11)
    • ►  October (2)
    • ►  August (2)
    • ►  July (3)
    • ►  June (1)
    • ►  May (1)
    • ►  April (1)
    • ►  January (1)
  • ►  2009 (19)
    • ►  December (2)
    • ►  November (1)
    • ►  August (2)
    • ►  June (1)
    • ►  March (3)
    • ►  February (3)
    • ►  January (7)
  • ►  2008 (143)
    • ►  December (5)
    • ►  November (3)
    • ►  September (4)
    • ►  August (1)
    • ►  July (6)
    • ►  June (19)
    • ►  May (9)
    • ►  April (10)
    • ►  March (34)
    • ►  February (22)
    • ►  January (30)
  • ▼  2007 (157)
    • ►  December (48)
    • ▼  November (54)
      • Advanced malware analysis and forensics using virt...
      • Building FTimes on Windows using Visual Studio
      • Solaris will soon run on IBM zSeries Mainframes
      • Malware and rootkit detection with Strider, RootKi...
      • Computer Randomly Plays Classical Music
      • Cracking Cisco type 7 and type 5 PIX passwords wit...
      • Covert Channels: NTFS Alternate Data Streams
      • Exploiting md5 and other hashing functions collisi...
      • 100th post - feedback on improving content
      • Paint.NET - tiny free Photoshop alternative for Wi...
      • Reavealing passwords fields (asterisk *** ) stored...
      • UNIX Deployment Tools - JumpStart, IgniteUX, NIM, ...
      • Windows PE tools, LiveCD, Deployment Tools
      • Sun Shared Shell - Collaborative Remote Access
      • Blue Pill - Malware Virtualization
      • GaG - the Graphical Boot Manager
      • VMware - using named pipes to redirect serial cons...
      • Sun Blackbox - underground datacenter in a Japanes...
      • Switch This - 3456 port Infiniband switch from Sun
      • Great Content
      • VMware Server 2.0 Beta
      • qemu - kqemu accelerator ported to other platforms
      • More fun using Tempest for Eliza and a photodiode
      • Firebug - awesome Web debugging tool - Firefox plugin
      • Sandboxie - a transient storage area jail
      • IBM's AIX 6.1 released, Open BETA ended
      • Virtualization - the new old thing everyone hypes ...
      • MIT releases the source code for MULTICS
      • Security Pro Admits to Hijacking PCs for Profit
      • Solaris digital forensics whitepaper
      • How to Charge an iPod using electrolytes and an onion
      • Now they're after piratebay... again.
      • The Blogosphere is safe for another day
      • Silly tests
      • xkcd takes life. Seriously.
      • The Inevitable Rise and Liberation of Music
      • Demonoid BitTorrent site taken down by record indu...
      • Al Qaeda declares Cyber Jihad on the West
      • First Forensic Forum defaced
      • sudo dd if=~/loveletter of=/dev/rwd0c
      • Open Source at Microsoft, working on ATK
      • Security through fear
      • DTrace: ported to FreeBSD, MacOS X, QNX
      • Terminus - best monospaced bitmap font ever
      • Trapped in Bureaucracy
      • GSMK CryptoPhone - source code available and AES25...
      • Security Through Obscurity
      • The Day The Routers Died
      • CoolStack 1.2 is out: Optimized Open Source Softwa...
      • Master bootable OpenBSD 4.2 install media
      • Using Vista diskpart - Dynamic disk and volume man...
      • Ext2 Filesystem for Linux and Solaris
      • OpenSolaris - Project Indiana LiveCD available for...
      • OpenBSD 4.2 Release, ISO image with install sets a...
    • ►  October (27)
    • ►  September (13)
    • ►  August (15)
  • ►  2006 (1)
    • ►  October (1)

Technorati Favorites

Add to Technorati Favorites