Journal of Mobile, Embedded and Distributed Systems - JMEDS
Rootkits are considered by many to be one of the most stealthy computer malware (malicious software) and pose significant threats. Hiding their presence and activities impose hijacking the control flow by altering data structures, or by using hooks in the kernel.
Legal and Practical Aspects in the Computer Science ...
Journal of Mobile, Embedded and Distributed Systems, vol. III, no. 2, 2011 ISSN 2067 – 4074 In order to be able to demonstrate in front of the court the fact that the data present on the investigated storing device are identical to the ones in the image created by EnCase, a hash of these can be carried out in order for the results to be compared.