7 Aug
2022
7 Aug
'22
4:44 a.m.
note: one way to do that, is to suspend the system to disk, and then boot off dedicated media and extract the memory from ram remanence. this approach would fail if an attacker acted to deter it.