What techniques do you use to recover deleted files or data from a compromised system?