Видео с ютуба Computer Forensics Using Linux Command Line
LCL 25 - Live Capture / Incidence Response - Linux Command Line tutorial for forensics
Command Line Forensics to Find Masquerading Malware on Linux
LCL 30 - sed - Учебное пособие по командной строке Linux для криминалистики
Linux Forensics with Linux - CTF Walkthrough
Module 7-Linux & Mac Forensics Explained | Chapter 7 Overview | BCIS 4320 Computer Forensics
Linux Stealth Rootkit Hunting with Command Line Forensics - FIRST 2025 Oslo Cold Incident Response
LCL 24 — руководство по netcat — руководство по командной строке Linux для криминалистики
LCL 21 - Process control commands - Linux Command Line tutorial for forensics
LCL 19 - EWF imaging and verification tools - Linux Command Line tutorial for forensics
Introduction to Computer Forensics - Capturing Output of Linux Commands
LCL 08 - getting help with commands - Linux Command Line tutorial for forensics
Linux Forensics! First Look at usbrip
LCL 06 - hardware info - Linux Command Line tutorial for forensics
5 лучших команд Linux
LCL 31 - cut - Linux Command Line tutorial for forensics
LCL 12 - mode bits revisited - Linux Command Line tutorial for forensics
Getting around the Linux filesystem - Linux Command Line tutorial for forensics
LCL 32 — сортировка — руководство по командной строке Linux для криминалистики
LCL 27 - locate & find - Linux Command Line tutorial for forensics
CF117 - Computer Forensics - Chapter 7 - Linux and Macintosh File Systems