Recovering data from a compromised VM: Difference between revisions