Which of the following steganography utilities exploits the nature of white space and allows the user to conceal information in these white spaces?
Which of the following comes as one of the last steps that should be taken to ensure that the compromise cannot be traced back to the source of the problem?