Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
RE: [Full-Disclosure] Imaging Operating Systems
From: Lachniet, Mark (mlachnietsequoianet.com)
Date: Wed May 26 2004 - 15:26:48 CDT
Any reason not to just use Ghost?
Also, some people use VMWARE, and make a "clean" VMWARE image, copy it,
load the suspicious stuff, and then delete it afterwards. If you have
your virtual network interfaces disabled, it may be a fairly safe
sandbox to work in.
> -----Original Message-----
> From: Michael Schaefer [mailto:mbsmistrealm.com]
> Sent: Wednesday, May 26, 2004 2:55 PM
> To: Full-Disclosure
> Subject: [Full-Disclosure] Imaging Operating Systems
> Hi all
> We are building a Windows test system, to try out tool bars,
> spy ware, malware and trojans on.
> Once we learn what we need to know, we obviously want to get
> rid of the junk quickly and cleanly.
> I keep hearing suggestions about having a "clean image" to
> transfer onto the computer.
> Can anyone send some details?
> Is there an official Microsoft way to do this?
> Is some sort of over the network OS installation script in order here?
> Are there other vendors that do a better job?
> Full-Disclosure - We believe in it.
> Charter: http://lists.netsys.com/full-disclosure-charter.html
Full-Disclosure - We believe in it.