Unix Commands

Read Complete Research Material

UNIX COMMANDS

UNIX Commands

UNIX Commands

Introduction

For every user security is very imperative. However, if any computer is compromised then, the user should evaluate it. For the evaluation, various programs and commands can be used. This paper discusses how a computer forensic investigator can use various UNIX commands for a compromised system.

UNIX Commands for Searching and Identifying Evidence

In order to search evidence for intrusion the UNIX command that can be used is “ls”. By using this command, an inspector can get the list of all the files and directories. These files and directories would be helpful to find out what the intruders has ...
Related Ads