Abstract
This section is devoted to studying log files by working with the Windows event log. The practical examples will have one common goal: to find features of the Windows Logging Service that can be exploited by cybercriminals to commit computer crimes. Identification of such features will make the system more secure and increase the level of event registration.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have