期刊名称:International Journal of Computer Science and Information Technologies
电子版ISSN:0975-9646
出版年度:2014
卷号:5
期号:2
页码:1131-1134
出版社:TechScience Publications
摘要:Gray Hat hackers/Insider can use Live Linux distribution to get into the resources of primary/secondary installed Operating system. By using such devices and distributions they can access the critical point of an Operating system which make them able to control User/Critical files that cannot be accessed within the operating system or can accessed either by Administrator or Operating system due to windows Security policy. Here we discuss that the Insider/ Gray hat hacker, by using such device, can manipulate windows operating system registries to get desired information. These accessed file can be copied to device for further change and analysis in secure place