Videos from Linux Forensics
-
Malware Part 2: is it a known file? -
You are watching this now -
Malware Part 4: using NM -
Malware Part 5: using LDD