nrw.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
Wir sind eine freundliche Mastodon Instanz aus Nordrhein-Westfalen. Ob NRW'ler oder NRW-Sympathifanten, jeder ist hier willkommen.

Serverstatistik:

2,8 Tsd.
aktive Profile

#dfir

6 Beiträge6 Beteiligte0 Beiträge heute
Natasha 👸<p>Sidder og kigger på en image af en T68i fra digital corpera. Jeg har lavet lidt python til at trække billeder ud men det fungere ikke helt. Nogle der ligger inde med filsystem formatet for sådan en telefon?</p><p>Eng: I am looking at an image of the storage in a T68i from digital corpera. I have written some simple python to extract pictures. But do anyone know about the storage layout of such phone?</p><p><a href="https://helvede.net/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://helvede.net/tags/4n6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>4n6</span></a> <a href="https://helvede.net/tags/mobile" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mobile</span></a></p>
b00010111<p>"The Impact of Microsoft’s ReFS on DFIR" -&gt; comparing NTFS evidences with ReFS. What stays, what changes and what will be gone. Recommended read! <a href="https://medium.com/@mathias.fuchs/the-impact-of-microsofts-refs-on-dfir-cdb78f401bfd" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">medium.com/@mathias.fuchs/the-</span><span class="invisible">impact-of-microsofts-refs-on-dfir-cdb78f401bfd</span></a> <a href="https://ioc.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://ioc.exchange/tags/ReFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ReFS</span></a> <a href="https://ioc.exchange/tags/NTFS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>NTFS</span></a> <a href="https://ioc.exchange/tags/filesystems" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>filesystems</span></a></p>
𝘾-rich<p><span class="h-card" translate="no"><a href="https://lgbtqia.space/@alice" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>alice</span></a></span><br>Did this asshole already exfiltrate our data needed or is he really feeling pressure?<br><span class="h-card" translate="no"><a href="https://infosec.exchange/@Kancept" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Kancept</span></a></span> </p><p><a href="https://mstdn.social/tags/sysmon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sysmon</span></a> <a href="https://mstdn.social/tags/logs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>logs</span></a># <a href="https://mstdn.social/tags/DLP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DLP</span></a> <a href="https://mstdn.social/tags/DPI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DPI</span></a> <a href="https://mstdn.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://mstdn.social/tags/fuckdoge" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fuckdoge</span></a></p>
Volexity :verified:<p>New on the <span class="h-card" translate="no"><a href="https://infosec.exchange/@volexity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>volexity</span></a></span> Blog: Multiple Russian threat actors are leveraging Signal, WhatsApp, and a compromised Ukrainian government email address to impersonate EU officials. This latest round of phishing attacks abuses first-party Microsoft Entra apps and OAuth to compromise targets.</p><p><a href="https://www.volexity.com/blog/2025/04/22/phishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">volexity.com/blog/2025/04/22/p</span><span class="invisible">hishing-for-codes-russian-threat-actors-target-microsoft-365-oauth-workflows</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a></p>
Chris Sanders 🔎 🧠<p>Investigation Scenario 🔎</p><p>You have detected unauthorized modification to /etc/libaudit.conf on a Linux server. </p><p>What do you look for to investigate whether an incident occurred and its impact? What could an attacker have done here?</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
Alexis Brignoni :python: :donor:<p>Going back to work after the weekend is like...</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
Andrea Lazzarotto<p>Fuji is allowing digital forensics professionals all over the world to easily perform <a href="https://mastodon.social/tags/macOS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>macOS</span></a> full file system acquisition, without heavy licensing costs.</p><p>This kind of feedback is really appreciated and helpful for spreading the word. A huge thank you to Cesar Amaya. 🙏</p><p>Do you use <a href="https://mastodon.social/tags/OpenSource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OpenSource</span></a> software in your <a href="https://mastodon.social/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> job? Tell others about it! Sharing is caring! 💪</p><p><a href="https://mastodon.social/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://mastodon.social/tags/MacForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MacForensics</span></a> <a href="https://mastodon.social/tags/AppleForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>AppleForensics</span></a> <a href="https://mastodon.social/tags/FujiApp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FujiApp</span></a> <a href="https://mastodon.social/tags/Fuji" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Fuji</span></a></p><p><a href="https://www.linkedin.com/posts/activity-7318758583553167361-q9Br/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">linkedin.com/posts/activity-73</span><span class="invisible">18758583553167361-q9Br/</span></a></p>
Alexis Brignoni :python: :donor:<p>Just like there is no self-made person there is no self-solved case.</p><p>Give credit where credit is due to all that participated no matter how much or how little the contribution was.</p><p>Stop sharing blame and start sharing the credit.</p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
Lenin alevski 🕵️💻<p>New Open-Source Tool Spotlight 🚨🚨🚨</p><p>Google's GRR (GRR Rapid Response) is an open-source framework for remote live forensics and incident response. It allows security teams to investigate systems at scale without interrupting operations. Used for data collection, analysis, and hunting. <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p><p>🔗 Project link on <a href="https://infosec.exchange/tags/GitHub" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GitHub</span></a> 👉 <a href="https://github.com/google/grr" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/google/grr</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/Software" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Software</span></a> <a href="https://infosec.exchange/tags/Technology" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Technology</span></a> <a href="https://infosec.exchange/tags/News" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>News</span></a> <a href="https://infosec.exchange/tags/CTF" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTF</span></a> <a href="https://infosec.exchange/tags/Cybersecuritycareer" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Cybersecuritycareer</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/purpleteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>purpleteam</span></a> <a href="https://infosec.exchange/tags/tips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tips</span></a> <a href="https://infosec.exchange/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://infosec.exchange/tags/cloudsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cloudsecurity</span></a></p><p>— ✨<br>🔐 P.S. Found this helpful? Tap Follow for more cybersecurity tips and insights! I share weekly content for professionals and people who want to get into cyber. Happy hacking 💻🏴‍☠️</p>
cyb_detective<p>Digital Forensic StartMe page</p><p>- getting started guides<br>- VM/distros<br>- decoding tools<br>- mobile forensics<br>- network analysis<br>- metadata tools<br>- SANS posters/cheatsheets</p><p><a href="https://start.me/p/m60j2v/digital-forensics" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">start.me/p/m60j2v/digital-fore</span><span class="invisible">nsics</span></a></p><p><a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a></p>
Kevin Pagano - Stark 4N6 :verified:<p>Minor version update for <a href="https://infosec.exchange/tags/Autopsy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Autopsy</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://github.com/sleuthkit/autopsy/releases/tag/autopsy-4.22.1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/sleuthkit/autopsy/r</span><span class="invisible">eleases/tag/autopsy-4.22.1</span></a></p>
Saltmyhash<p>This NLRB whistleblower complaint is a horror story for any CERT team. As a CTI/SOC analyst, if I see spawned powershell invoking web requests to some random-ass AI API reverse-engineering tool/headless browser repository, large outbound byte transfers measured in GBs, or conditional access policies/MFA being tampered with, you’re getting isolated and we’re standing up an incident response bridge. Also, someone on your team has an info stealer on their device if they’re seeing attempted logins from a foreign country within fifteen minutes of account creation. </p><p>This is an insider threat case of the worst kind: one your security team gets to watch but can’t do a damn thing to stop. </p><p><a href="https://arstechnica.com/tech-policy/2025/04/government-it-whistleblower-calls-out-doge-says-he-was-threatened-at-home/?comments-page=1#comments" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">arstechnica.com/tech-policy/20</span><span class="invisible">25/04/government-it-whistleblower-calls-out-doge-says-he-was-threatened-at-home/?comments-page=1#comments</span></a></p><p><a href="https://whistlebloweraid.org/wp-content/uploads/2025/04/2025_0414_Berulis-Disclosure-with-Exhibits.s.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">whistlebloweraid.org/wp-conten</span><span class="invisible">t/uploads/2025/04/2025_0414_Berulis-Disclosure-with-Exhibits.s.pdf</span></a></p><p><a href="https://infosec.exchange/tags/cti" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cti</span></a> <a href="https://infosec.exchange/tags/soc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>soc</span></a> <a href="https://infosec.exchange/tags/threatintel" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threatintel</span></a> <a href="https://infosec.exchange/tags/dfir" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dfir</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Alexis Brignoni :python: :donor:<p>Is the tool vendor provided training subject to tariffs too?</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a> <a href="https://infosec.exchange/tags/SameContentForDoubleThePrice" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SameContentForDoubleThePrice</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a></p>
DFN-CERT<p>🐰 Rechtzeitig zu Ostern: neue Versionen von <a href="https://infosec.exchange/tags/Sleuthkit" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Sleuthkit</span></a> und <a href="https://infosec.exchange/tags/Autopsy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Autopsy</span></a> erschienen:</p><p><a href="https://github.com/sleuthkit/sleuthkit/releases/tag/sleuthkit-4.14.0" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/sleuthkit/sleuthkit</span><span class="invisible">/releases/tag/sleuthkit-4.14.0</span></a></p><p><a href="https://github.com/sleuthkit/autopsy/releases/tag/autopsy-4.22.1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/sleuthkit/autopsy/r</span><span class="invisible">eleases/tag/autopsy-4.22.1</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/Forensik" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Forensik</span></a></p>
13reak :fedora:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@chrissanders88" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>chrissanders88</span></a></span> </p><p>Getting the volatile data first with velociraptor Windows.System.DLLs.<br>(Maybe the dll is still loaded)</p><p>Then of course, getting the dll from the file system. Maybe dumping it in a sandbox /checking the hash on virus total.</p><p>Otherwise evidence of execution. I think e.g. AppCompatCache also lists dlls.</p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/velociraptor" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>velociraptor</span></a></p>
Chris Sanders 🔎 🧠<p>Investigation Scenario 🔎</p><p>The process explorer.exe spawned rundll32.exe on a system on your network.</p><p>What do you look for to investigate whether an incident occurred?</p><p>Assume you have access to whatever digital evidence source you need.</p><p><a href="https://infosec.exchange/tags/InvestigationPath" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InvestigationPath</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/SOC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOC</span></a></p>
Kevin Pagano - Stark 4N6 :verified:<p><a href="https://infosec.exchange/tags/Stark4N6" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Stark4N6</span></a>: Tracking iOS App Installs and Purchase History with StoreUser DB <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://www.stark4n6.com/2025/04/tracking-ios-app-installs-and-purchase.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">stark4n6.com/2025/04/tracking-</span><span class="invisible">ios-app-installs-and-purchase.html</span></a></p>
Alexis Brignoni :python: :donor:<p>Sadly some actually do 😬</p><p><a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/MobileForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MobileForensics</span></a></p>
The DFIR Report<p>Passionate about Digital Forensics and Incident Response? Want to share your expertise with the security community while collaborating with talented analysts worldwide?</p><p>We're looking for volunteer analysts to join the team! We dive deep into real-world threats and publish monthly public reports detailing threat actor TTPs and how they achieve their goals.</p><p>As part of the team, you will:</p><p>➡️Analyze intrusion data and contribute to impactful DFIR reports.<br>➡️Help shape how we share findings 📄🎨<br>➡️Collaborate with and learn from amazing analysts across the globe.<br>➡️Access our internal group to ask questions, share insights, and improve processes. 🧠<br>➡️ Have the unique opportunity to present our collective findings at security conferences and talks! 🎤</p><p>Ready to join the team? Follow the process ➡️ <a href="https://github.com/The-DFIR-Report/DFIR-Artifacts" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/The-DFIR-Report/DFI</span><span class="invisible">R-Artifacts</span></a></p><p><a href="https://infosec.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://infosec.exchange/tags/DigitalForensics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DigitalForensics</span></a> <a href="https://infosec.exchange/tags/IncidentResponse" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>IncidentResponse</span></a> <a href="https://infosec.exchange/tags/ThreatIntelligence" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ThreatIntelligence</span></a> <a href="https://infosec.exchange/tags/CyberSecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CyberSecurity</span></a> <a href="https://infosec.exchange/tags/InfoSec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>InfoSec</span></a></p>
b00010111<p>Sounds very handy: <br>"This script is designed to automate the following operations:<br>Mounting disk images (E01 or raw)<br>Handling LVM volumes<br>Automatically identifying and mounting partitions<br>Exporting mounted partitions into E01 format if desired<br>Safely unmounting and cleaning up devices and volumes when finished<br>All mount operations are performed read-only, with noexec and other conservative options to preserve evidence integrity."</p><p><a href="https://www.hecfblog.com/2025/04/daily-blog-805-mount-that-thing.html?m=1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hecfblog.com/2025/04/daily-blo</span><span class="invisible">g-805-mount-that-thing.html?m=1</span></a> <a href="https://ioc.exchange/tags/DFIR" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DFIR</span></a> <a href="https://ioc.exchange/tags/linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linux</span></a></p>