DEV Community

Discussion on: Introduction to computer forensics

Collapse
 
p3k profile image
Tobi Schäfer

how secure is it to transfer the forensic data via network? couldn’t the network stack of the attacked machine be compromised, too? (e.g. send a copy of the data to the attacker?)