While there are good things in your answer, a lot of it comes out as bashing a competitor product, with a bit of advertisement at the end which isn't against the rule, but comes out a little odd, considering that this is a questions and answers , not a discussion forum.
The hyperbole might put some readers off as well. This could explain why your answer was downvoted. I suggest toning it down a bit. GuyHoozdis I really admire your advice on the subject. It was thorough and very informative. In my case can't disclose it openly but it relates to the high possibility of information copied from a sensitive machine into a USB-device.
The victim machine in this case ; was not forensically sound or prepared to detect such instances occurrences. Thank you for your feedback and insight Gilles- I appreciate your candor. Bashing was not my intention nor was self-promotion; however, I'm sure that you are right because if you perceived it that way then many others did too.
Saladin, I'm glad you found some utility in my ramblings. I did come across some new research in this area a few months ago- if my memory serves me. I'll have to go look for an exact link, but I came across the information in a CyberSpeak podcast. You can search for yourself if this is still relevant.
I just took a quick look and here are some links that reference what I was talking about I suggest you listen to the whole episode, but I think around will briefly mention how this relates to your situation.
It is a commercial tool and I have not yet used it myself pursue it at your own risk. I want to point out claim about USB devices in the release notes that is relevant to your situation; "see when they were attached over time" arsenalrecon. The Overflow Blog. Podcast Making Agile work for data science. Stack Gives Back Featured on Meta. New post summary designs on greatest hits now, everywhere else eventually.
Prepare for the worst case your data have been compromised. Add a comment. Active Oldest Votes. Give more details on what you need, and people will be able to give better ideas. Improve this answer. The computer that my pendrive connect use windows xp. Oh deaar I have big problem. Anything software or anything trick to knowing the case? Thanks — Lena Queen. You could have any chance if you have access to the windows xp computer, and is able to analyze it. Can you? Yes I can but now the computer is shut down maybe tomorrow I can access and analyze.
How do that? I edited your question to reflect what you told us and what you need to know Show 3 more comments. Contents Exit focus mode. Is this page helpful? Please rate your experience Yes No. Any additional feedback? Submit and view feedback for This product This page. View all page feedback. In this article. Specifies the location and names of the files you want to copy. This parameter must include either a drive or a path.
Specifies the destination of the files you want to copy. This parameter can include a drive letter and colon, a directory name, a file name, or a combination of these. Displays the following message and waits for your response before starting to copy files: Press any key to begin copying file s.
Verifies each file as it is written to the destination file to make sure that the destination files are identical to the source files.
Copies source files changed on or after the specified date only. This command-line option allows you to update files that have changed. If Source is a directory or contains wildcards and Destination does not exist, xcopy assumes Destination specifies a directory name and creates a new directory.
Then, xcopy copies all specified files into the new directory. Does anybody know what is the software I am looking for? Here's the details.
It logs all data transfer information date, time and file name, size Please help. Spiceworks Help Desk. The help desk software for IT. Track users' IT needs, easily, and with only the features you need.
Learn More ».
0コメント