Skip to Main Content
Operating System Forensics
book

Operating System Forensics

by Ric Messier
November 2015
Intermediate to advanced content levelIntermediate to advanced
386 pages
12h 50m
English
Syngress
Content preview from Operating System Forensics
Chapter 4

Memory Forensics

Abstract

The chapter discusses the use of open source tools to collect memory and analyze it as part of a forensic investigation.

Keywords

operating systems
forensics
operating environments

INFORMATION INCLUDED IN THIS CHAPTER:

Virtual memory
Windows, Linux, Mac OS memory
Memory extraction
Swap space

Introduction

Data is permanently stored on what is called secondary storage, which is what we have been talking about so far – disk drives, USB flash drives, and other forms of permanent storage. However, when a computer is running and programs are using the data that has been retrieved from the disk, the programs and data are placed into primary storage or main memory. Well, it is used to be called as main memory. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Computer Forensics InfoSec Pro Guide

Computer Forensics InfoSec Pro Guide

David Cowen
Windows Forensics Cookbook

Windows Forensics Cookbook

Scar de Courcier, Oleg Skulkin
Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

Eoghan Casey, Cameron H. Malin, James M. Aquilina

Publisher Resources

ISBN: 9780128019634