Discussion: "Operating System Forensics"
Use the Internet or the Strayer Library to research at least one commonly used Linux-based system forensics software tool. Describe the tool's primary uses, strengths and weaknesses, competing products, costs, system requirements, and whether military, law enforcement and / or private corporations use the tool. Provide a link to the tool. Discuss the difference between open source (free ) tools and those that are purchased. From your research, which tool is more efficient? Justify your answer.
The response should include a reference list. Double-space, using Times New Roman 12 pnt font, one-inch margins, and APA style of writing and citations.