Skip to Main Content
Operating System Forensics
book

Operating System Forensics

by Ric Messier
November 2015
Intermediate to advanced content levelIntermediate to advanced
386 pages
12h 50m
English
Syngress
Content preview from Operating System Forensics
Chapter 5

System Configuration

Abstract

This chapter provides an overview of configuration artifacts for Linux, Windows, and Mac OS including the Windows registry, Mac OS plists, and places where Linux has configuration files.

Keywords

operating systems
forensics
operating environments
configuration
windows registry
plists

INFORMATION INCLUDED IN THIS CHAPTER:

Windows registry
.inf files
Linux /etc directory
Mac OS plist files

Introduction

One advantage we are looking for now is the fact that system configuration has really settled down to some pretty specific areas. This has not always been the case. Windows, for example, generally has configuration details stored in the Windows registry. The registry, interestingly, was originally intended ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Computer Forensics InfoSec Pro Guide

Computer Forensics InfoSec Pro Guide

David Cowen
Windows Forensics Cookbook

Windows Forensics Cookbook

Scar de Courcier, Oleg Skulkin
Malware Forensics Field Guide for Linux Systems

Malware Forensics Field Guide for Linux Systems

Eoghan Casey, Cameron H. Malin, James M. Aquilina

Publisher Resources

ISBN: 9780128019634