The paper reviews classical network steganography methods while highlighting the evolution towards real-time network data steganography, which addresses challenges of embedding data in data-in-motion and data-in-use contexts. It contrasts traditional embedding techniques with new methodologies that exploit network protocols for covert communication, and outlines various network steganography tools and their functionalities. The work aims to stimulate advancements in computer network security through the introduction of a novel system-level implementation for real-time operations.