Discuss 4 different methods that are commonly used as anti-computer forensic measures. For each method, provide a name, description, how it works, and how an investigator can countermeasure it. (ex: encryption, HPA, steganography.)

Discuss 4 different methods that are commonly used as anti-computer forensic measures. For each method, provide a name, description, how it works, and how an investigator can countermeasure it. (ex: encryption, HPA, steganography.)