(Computer forensics technology, to obtain clues after the attack... This document includes the following attachments:
Network Security--Forensics and Honeypots (Part of Computer Forensics).pdf
Including multiple files, please download and test by yourself!)