The chapter discusses the use of open source tools to collect memory and analyze it as part of a forensic investigation.
Keywords
operating systems
forensics
operating environments
INFORMATION INCLUDED IN THIS CHAPTER:
• Virtual memory
• Windows, Linux, Mac OS memory
• Memory extraction
• Swap space
Introduction
Data is permanently stored on what is called secondary storage, which is what we have been talking about so far – disk drives, USB flash drives, and other forms of permanent storage. However, when a computer is running and programs are using the data that has been retrieved from the disk, the programs and data are placed into primary storage or main memory. Well, it is used to be called as main memory. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month, and much more.