| Description: | 
                Covers, encryption, stenography use and detection, hiding collections of pictures, disk wiping - the tools are getting scarily good, what good are good/bad signatures, metasploit, advanced anti-forensics - everything happens in RAM, Linux anti-forensics - hide where the tools dont look. 
                            |