The chapter discusses the use of open source tools to collect memory and analyze it as part of a forensic investigation.
INFORMATION INCLUDED IN THIS CHAPTER:
• Virtual memory
• Windows, Linux, Mac OS memory
• Memory extraction
• Swap space
Data is permanently stored on what is called secondary storage, which is what we have been talking about so far – disk drives, USB flash drives, and other forms of permanent storage. However, when a computer is running and programs are using the data that has been retrieved from the disk, the programs and data are placed into primary storage or main memory. Well, it is used to be called as main memory. ...
Get Operating System Forensics now with O’Reilly online learning.
O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.