[The first part of this article described the steps needed to do a live memory acquisition of a potentially compromised system using a free tool called Redline - version 1.11.1 -. In this case the system was my wife's computer which had been complaining about the slowness of her system for quite some time. With the […]