Foreword

In the Introduction to Hiding Behind the Keyboard, Brett Shavers is far too modest in saying if you get one nugget of useful information from it, then his writing the book will have been worthwhile. Instead, you will surely find, as I did, an impressive cornucopia of golden nuggets throughout these pages.
A broad landscape of technical topics is thoroughly presented here, including encryption schemes and methods; steganography; the Tor browser; the TAILs operating system; password cracking; decoy storage devices; time stamp modification; file signature manipulation; bootable operating systems; using media address control (MAC) to identify source; portable apps; hidden and decoy operating systems; virtual machines; key loggers; antiforensic ...

Get Hiding Behind the Keyboard now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.