![]() There are a number of different software tools out there that will handle graphics that have been 'stegged'. The images may have hidden messages created by the use of Steganography. If this is some kind Forensic Computing 'find the hidden data' test, then there are a number of things that spring to my mind straight away: -ġ. The 32 bit floating point number sounds to vague, again can you clarify this as it doesn't mean anything to me (it might be a red herring designed to take your eye off the ball). How did you find the three you already have? How were they hidden?Īnd what type of document i.e. □Īlso do you mean - PPM = PBM Portable Pixelmap Graphic? It sounds like part two of the EnCase EnCE exam. is it course work or a live investigation, etc – this will help establish where to begin. ![]() Can you elaborate a little more on the task you have been given i.e. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |