SUMMARY

In this chapter we discussed how to determine if unknown files are malicious. We even covered the basics of reverse engineering. With this chapter, we have now covered every major topic in the world of Linux forensics. In the next chapter we will discuss taking Linux forensics to the next level.

CHAPTER

results matching ""

    No results matching ""