Cyber Security Lab
IT Security & IT Forensics Examples
Web Forensics
Techniques of obfuscation
Methods to impede forensic analysis.
Exercise A: Screenshot
Exercise B: Select text
Exercise C: Layer images