Discuss anti-forensics techniques and explain how to detect steganography, hidden data in file system structures, trail obfuscation, and file extension mismatch.
Present now part 2
Research network forensics please see attached documents for further details [removed]