You can just mount the file system right from your Linux box or you can generate a very simple parser to check out the historical past of the file program operations. The other entertaining component we will look at is the file method. Recent revelations of the NSA ANT plan illustrated the quite a few perfectly-identified and small-price tag actual physical and firmware assaults that can compromise facts in-use and technique integrity.