![SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute](https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/blt3d3fa70a65919e1f/5dc863b41bfdeb01f7b42f17/mount1.jpg)
SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute
![SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute](https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/bltf50f09ab616630cc/5dc863db5ffacd040955786b/virus-scan1.jpg)
SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute
![SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute SANS Digital Forensics and Incident Response Blog | Digital Forensic SIFTing: How to perform a read-only mount of filesystem evidence | SANS Institute](https://images.contentstack.io/v3/assets/blt36c2e63521272fdc/bltd6355fad4be54e9f/5dc8631c174f6e021220de54/ifconfig1.jpg)