I work in an educational setting, and part of my job is to do Data Security Investigations when an institutional machine appears to have been compromised. I am required to capture a forensically...