A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
#:~:text=Obfuscation%20of%20character%20strings%20is,data%20when%20the%20code%20executes.
Juan
9 months agoAn
9 months agoYuriko
9 months agoCoral
9 months agoMireya
8 months agoMartina
8 months agoShelba
8 months agoAnnett
8 months agoGilberto
8 months agoLoreen
8 months agoAshton
9 months agoRoyce
9 months agoAn
9 months ago