Hello! Some specifics would be needed though. Is it a hardware RAID array or is it simply the Windows Built-In Raid 5 function or is it something like Vertias Volume Manager. This makes a difference because of the tools you will be able to use to do the analysis. Simply put, RAID is a big beast and somewhat complex because it can be implemented by software, hardware, or a combination of both. Hope this helps, Albert > I have a server that was compromised. I've been doing lower level > forensics > on machines with single drives, but I don't know what I need to do to > image > a RAID array. I haven't seen the machine yet, so I can't give you any > specifics about it. Can any of you guys give me an idea of what I need to > do? Thanks. > ------------------------------------------------------ > Hunter Ely > Network Security Analyst, Office of Computing Services > Louisiana State University > http://hunter.lsu.edu > > > > ----------------------------------------------------------------- > This list is provided by the SecurityFocus ARIS analyzer service. > For more information on this free incident handling, management > and tracking system please see: http://aris.securityfocus.com > -- GMX - Die Kommunikationsplattform im Internet. http://www.gmx.net ----------------------------------------------------------------- This list is provided by the SecurityFocus ARIS analyzer service. For more information on this free incident handling, management and tracking system please see: http://aris.securityfocus.com
This archive was generated by hypermail 2b30 : Fri May 10 2002 - 10:16:16 PDT