Describe the methods by which suspects hide, encrypt or password protect the incriminating evidence. What procedures are used by the suspect to hide files on the suspect drive, or formatted media and how does the computer forensics investigator examine hidden, password protected or encrypted files with forensics tools?