Abstract

This section is devoted to studying log files by working with the Windows event log. The practical examples will have one common goal: to find features of the Windows Logging Service that can be exploited by cybercriminals to commit computer crimes. Identification of such features will make the system more secure and increase the level of event registration.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call