Short bio: Computer Scientist, FOSS supporter (read more)
Tux Machines (TM)-specific
Some of the more nefarious Steganography tactics include hiding information for illegal reasons. In fact, terrorist organizations are known to use this process to hide information in harmless images hosted on Web sites. Learn whats at stake and how to detect and thwart Steganography techniques and blunt its effectiveness.