142
DIGITAL FORENSICS EXPLAINED
could be configured as writable in comparison with read-only mode in the
Live CD approach.
• Virtual machines: e operating system or program runs within a virtual
environment. is could be to an attacker’s advantage since some security
tools may not look for a “rootkit” running in a virtual environment. e vir-
tual machine saves its state to files on the storage medium of the physical host.
Last but not least, we need to mention anonymous accounts. We could use fake
identities and storage from public sources (e.g., Yahoo!, Gmail, ADrive, Dropbox)
to avoid storage information and tool evidence on local computers. In addition,
websites like www.bugmenot.com, http://www.phenoelit-us.org/dpl/dpl.html, and
http://1 ...