Linux Memory Forensics Part 2 – How to Detect Malicious Artifacts on Linux?