- Learning Python for Forensics
- Preston Miller Chapin Bryce
- 198字
- 2021-08-20 10:17:11
Running the script
In this iteration, we address several issues from the proof of concept. These changes include the following:
- The improvement of resource management by iterating through a file rather than reading the entire file into a variable
- The addition of an argument to allow the user to provide the setupapi.dev.log file to parse
- The validation of the input file from the user
- The filtering of responsive hits to reduce noise in the output
- Improved formatting of our output for ease of review
The following screenshot shows a snippet of the output of our script upon execution:

Last but not least, we achieved considerable performance improvements over our previous design. The following screenshots display the impact on the machine's memory utilization. The first iteration is displayed on the left and the second is displayed on the right. The red lines highlight the start and finish time of our script. As we can see, we have reduced our resource utilization by iterating across the lines of the file with the for loop over the readlines() method. This is a small-scale example of resource management, but a larger input file would have a more dramatic impact on the system:

- 深入淺出隱私計(jì)算:技術(shù)解析與應(yīng)用實(shí)踐
- 走進(jìn)新安全:讀懂網(wǎng)絡(luò)安全威脅、技術(shù)與新思想
- INSTANT Windows PowerShell
- 數(shù)據(jù)安全實(shí)踐指南
- 數(shù)據(jù)安全與隱私計(jì)算(第3版)
- 移動(dòng)APT:威脅情報(bào)分析與數(shù)據(jù)防護(hù)
- Computer Forensics with FTK
- 網(wǎng)絡(luò)安全設(shè)計(jì)、配置與管理大全
- 網(wǎng)絡(luò)關(guān)鍵設(shè)備安全檢測(cè)實(shí)施指南
- 功能型密碼算法設(shè)計(jì)與分析
- 計(jì)算機(jī)網(wǎng)絡(luò)安全實(shí)驗(yàn)指導(dǎo)
- 計(jì)算機(jī)系統(tǒng)與網(wǎng)絡(luò)安全研究
- 5G網(wǎng)絡(luò)安全規(guī)劃與實(shí)踐
- Blockchain Development with Hyperledger
- 云安全深度剖析:技術(shù)原理及應(yīng)用實(shí)踐