O'Reilly logo

Computer Forensics: Incident Response Essentials by Warren G. Kruse, Jay G. Heiser

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 5. Data Hiding

One of the most challenging aspects of a forensic analysis of a computer is the possibility of data being intentionally hidden by your suspect. Always assume that a system you are examining might contain hidden data. Even if it was not intentionally hidden to defeat analysis, data hidden by the operating system exists on all systems. With practice and the techniques we will share with you, many of your encounters with hidden data can be rewarding experiences.

As shown on Table 5-1, there are a number of different ways to hide data on a computer. We discussed encryption in the previous chapter, but it should be clear from Table 5-1 that encryption is not the only way to obscure information. Many of these techniques have ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required