{"version":"1.0","provider_name":"Magnet Forensics","provider_url":"https:\/\/www.magnetforensics.com\/de\/","author_name":"Alison Werezak","author_url":"https:\/\/www.magnetforensics.com\/de\/blog\/author\/alison-werezak\/","title":"F\u00fcr Linux-Artefakte: Kurzhandbuch Zielspeicherorte - Magnet Forensics","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"1EzzW3foxl\"><a href=\"https:\/\/www.magnetforensics.com\/de\/resources\/fuer-linux-artefakte-kurzhandbuch-zielorte\/\">F\u00fcr Linux-Artefakte: Kurzhandbuch Zielspeicherorte<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.magnetforensics.com\/de\/resources\/fuer-linux-artefakte-kurzhandbuch-zielorte\/embed\/#?secret=1EzzW3foxl\" width=\"600\" height=\"338\" title=\"&#8220;F\u00fcr Linux-Artefakte: Kurzhandbuch Zielspeicherorte&#8221; &#8212; Magnet Forensics\" data-secret=\"1EzzW3foxl\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.magnetforensics.com\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.magnetforensics.com\/wp-content\/uploads\/2021\/04\/image__1_.png","thumbnail_width":488,"thumbnail_height":488,"description":"Die Suche nach Daten, die Sie f\u00fcr eine Ermittlung ben\u00f6tigen, kann schwierig sein, selbst wenn Sie mit der Datenquelle vertraut sind. Wenn Sie aber in Linux system Ermittlungen neu sind oder gerade erst einsteigen, kann dies die Dinge noch mehr erschweren."}