Welcome to this new article, today I am going to show you how to clean your traces of a hacked computer, to be able to operate without your commands or your actions within the system are recorded in the system logs.
To demonstrate this I will use two tools, one is created for use in Linux systems...