tag:blogger.com,1999:blog-4088979.post4253280965723383473..comments2023-10-16T06:06:25.012-04:00Comments on TaoSecurity Blog: TaoSecurity Enterprise Trust PyramidRichard Bejtlichhttp://www.blogger.com/profile/13512184196416665417noreply@blogger.comBlogger9125tag:blogger.com,1999:blog-4088979.post-5672829231849013492009-04-27T05:05:00.001-04:002009-04-27T05:05:00.001-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-34398911032434278892009-04-27T05:05:00.000-04:002009-04-27T05:05:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-87308550555092379832009-04-27T05:03:00.000-04:002009-04-27T05:03:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-13892875753655915502009-01-30T20:57:00.001-05:002009-01-30T20:57:00.001-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-44832005416478549562009-01-30T20:57:00.000-05:002009-01-30T20:57:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-66338609630746889762009-01-30T20:56:00.000-05:002009-01-30T20:56:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-3326388511226302952007-10-26T05:29:00.000-04:002007-10-26T05:29:00.000-04:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-45666427232792721302007-01-31T23:09:00.000-05:002007-01-31T23:09:00.000-05:00This comment has been removed by a blog administrator.Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-4088979.post-46876608630739261782007-01-28T14:35:00.000-05:002007-01-28T14:35:00.000-05:00Back to the bottom of the trust heap goes the desk...<i>Back to the bottom of the trust heap goes the desktop!</i><br /><br />Not necessarily. Forensic analysts should not rely solely on a single piece of data, but rather the data taken as a whole. Similar to Jesse Kornblum's recent <a href="http://jessekornblum.livejournal.com/210627.html">Buffalo Paper</a>, there are more parts to the desktop that you can make use of, and take all of the data in totality.<br /><br />HarlanH. Carveyhttps://www.blogger.com/profile/08966595734678290320noreply@blogger.com