CI&R WARRIORS

HANDLING HIDDEN DATA


Listen Later

HANDLING HIDDEN DATA

Technology savvy criminals use various methods to hide incriminating information.

  1. Hidden files and folders
  2. System files
  3. Alternate data streams (ADS)
  4. Featuring "keycybr" CI&R Intern "Paladugu Jashwanth". He is currently pursuing his bachelor's of technology in the stream of computer science (2nd year).

    Get in touch with him - https://www.linkedin.com/in/paladugu-jashwanth-a28a23150/

    ...more
    View all episodesView all episodes
    Download on the App Store

    CI&R WARRIORSBy keycybr