This article is based on '' If you hacked a system so how you can fully erase every log and history and make it hard to do forensics for cyber sectors " Hidden content