Description: |
Encryption, Steganography, Self Split Files + Encryption, Defeat ˇ°last modified filesˇ± technique, Wipe, Data Hiding: swap, file system bad blocks, unallocated spaces, ADS, Process dump, Integrity check (MD5 Collision), Database Rootkits, BIOS Rootkits.
|