23.12.2012 Views

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

Digital Forensics in Small Devices: RFID Tag Investigation

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

SQL Server events can be identified. Hence, the follow<strong>in</strong>g syntax was used to<br />

acquire the r<strong>in</strong>g buffer data.<br />

:out E:\R<strong>in</strong>gBuffer.txt<br />

SELECT * FROM sys.dm_os_r<strong>in</strong>g_buffers<br />

GO<br />

The fragment of acquired r<strong>in</strong>g buffer data out was as shown <strong>in</strong> the Figure 4.23.<br />

Figure 4.23: Fragment of R<strong>in</strong>g Buffer data results from sys.dm_os_r<strong>in</strong>g_buffers<br />

The notable results <strong>in</strong>cluded not only the timestamp of each buffer entry, but<br />

also the record of the SQL Server events.<br />

Furthermore, the acquisition of the r<strong>in</strong>g buffer security error was also<br />

essential as <strong>in</strong> order to determ<strong>in</strong>e log<strong>in</strong> failures and events related to the<br />

security. Thus, the follow<strong>in</strong>g syntax was used to acquire the security related<br />

errors.<br />

:out E:\R<strong>in</strong>gBuffers.txt<br />

SELECT * FROM sys.dm_os_r<strong>in</strong>g_buffers WHERE r<strong>in</strong>g_buffer_type =<br />

„RING_BUFFER_SECURITY_ERROR‟<br />

GO<br />

97

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!