Quantcast
Channel: 新しいコンテンツ
Viewing all articles
Browse latest Browse all 5159

DeviceLock DLP: How to use digital signatures to search shadow database

$
0
0

Description

The data logged by DeviceLock can be checked against hash databases (collections of digital signatures of known, traceable data) and used in computer forensics.

For example, you can trace users copying signatured files, with reference to time and devices.

More information about hash databases and their samples can be found at the National Software Reference Library web site: http://www.nsrl.nist.gov


Viewing all articles
Browse latest Browse all 5159

Trending Articles