Assignment:
Based on the techniques discussed for hiding data on a computer, which method would you use for the following:
Hiding information from a young family member who uses the same computer
Hiding information from a colleague who is a network administrator
Hiding information from an intelligence agency, such as the CIA
Data hiding techniques: -
1.hide in the properties
2.rename/change extension
3.steganography
4.hash
5.encryption
6.bit shifting