Description: |
Covers, encryption, stenography use and detection, hiding collections of pictures, disk wiping - the tools are getting scarily good, what good are good/bad signatures, metasploit, advanced anti-forensics - everything happens in RAM, Linux anti-forensics - hide where the tools dont look.
|