I have a server that was compromised. I've been doing lower level forensics on machines with single drives, but I don't know what I need to do to image a RAID array. I haven't seen the machine yet, so I can't give you any specifics about it. Can any of you guys give me an idea of what I need to do? Thanks. ------------------------------------------------------ Hunter Ely Network Security Analyst, Office of Computing Services Louisiana State University http://hunter.lsu.edu ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Thu May 09 2002 - 03:41:33 PDT