■Select Windows Securityfrom the Utilities (Figure 1-52).įigure 1-52Select Windows Securityfrom the Utilities.Īfter completing this chapter, you should be able to:ĭetermine the best data acquisition methodsĭata acquisitionthe act of taking possession of or obtaining control of data and adding it to a collection of evidenceĭata duplicationthe act of making a copy of data already acquired to preserve the original evidence in pristine condition Browse the image file and message file, and click the Encryptbutton (Figure 1-51).įigure 1-51Browse the image and message files, and click the Encryptbutton. ■Select Steganography 2.8from the Utilities menu. ■Install and launch the FortKnox program.įigure 1-50Explore the various options in FortKnox.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |