[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20030423173115.GA3057@eiv.com>
From: smcmahon at eiv.com (Shawn McMahon)
Subject: Break-in discovery and forensics tools
On Wed, Apr 23, 2003 at 09:18:58AM -0700, Hotmail said:
> I realize the importance of after incident forensics... What I dont
> understand is logs used in a court for prosecution. Logs are inheritly not
> preservable or physical evidence, it is tamperable from the time the
> external data hits a MAC, if that were the case basicly I could take my logs
> and edit any damn originating ip i choose, send thosse logs to law
> enforcement, and have an innocent person convicted. Logs are nice.. but IMHO
> defeatable in court.
Logs are testimony. They're no more tamperable than verbal testimony.
It's up to the judge and/or jury to decide what weight to give them.
--
Shawn McMahon | Let every nation know, whether it wishes us well or ill,
EIV Consulting | that we shall pay any price, bear any burden, meet any
UNIX and Linux | hardship, support any friend, oppose any foe, to assure
http://www.eiv.com| the survival and the success of liberty. - JFK
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 189 bytes
Desc: not available
Url : http://lists.grok.org.uk/pipermail/full-disclosure/attachments/20030423/f6d95cf5/attachment.bin
Powered by blists - more mailing lists