Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our User Agreement and Privacy Policy.
Slideshare uses cookies to improve functionality and performance, and to provide you with relevant advertising. If you continue browsing the site, you agree to the use of cookies on this website. See our Privacy Policy and User Agreement for details.
Sign up for a Scribd free trial to download now.
Download with free trialDownload to read offline
Sign up for a Scribd free trial to download now.
Download with free trialDownload to read offline
Sign up for a Scribd free trial to download now.
Download with free trial
Documents contain metadata and hidden information that can be used to disclose private data and to
fingerprint an organisation and its network computers. This document shows what kinds of data can be found, how to
extract them and proposes some solutions to the problem stated here.
Be the first to like this
Documents contain metadata and hidden information that can be used to disclose private data and to fingerprint an organisation and its network computers. This document shows what kinds of data can be found, how to extract them and proposes some solutions to the problem stated here.
Total views
29,702
On Slideshare
0
From embeds
0
Number of embeds
23,834
Downloads
53
Shares
0
Comments
0
Likes
0
Join the community of over 1 million readers
Join the community of over 1 million readers
Sign up for a Scribd 30 day free trial to download this document plus get access to the world’s largest digital library.
Cancel anytime.The SlideShare family just got bigger. You now have unlimited* access to books, audiobooks, magazines, and more from Scribd.
Cancel anytime.