A threat actor attempts to avoid detection by turning data into a code that shifts numbers to the right four times. Which anti-forensics technique is being used?
#:~:text=Obfuscation%20of%20character%20strings%20is,data%20when%20the%20code%20executes.
Juan
2 months agoAn
3 months agoYuriko
3 months agoCoral
3 months agoMireya
1 months agoMartina
1 months agoShelba
2 months agoAnnett
2 months agoGilberto
2 months agoLoreen
2 months agoAshton
2 months agoRoyce
3 months agoAn
3 months ago