Introduction to Computer Forensics
and Steganography 
Lab Practice 
You are computer forensics specialist and you were called to the crime 
scene to examine the computer. 
You believe that the person who used the computer encrypted the file 
data.htm, that contains some important information about the 
criminal 
activities. This file was encrypted by Invisible Secrets tool and you 
believe that the person used the password that is binary number that 
corresponds to 22. 
You believe also that as soon as you will be able to decrypt the 
data.htm.isc file you will be able to get some information that 
will help 
you to determine the list of the criminal activities.
Lab Practice:
- 	The are two files posted on the course website: data.htm.isc and 
pic.jpg
 - 	First, save both files on desktop of your computer. 
- 	Important: when you save the data.htm.isc file, make sure 
that you 
type in the full name of the file, including .isc, otherwise the file will 
not be saved properly.
 
 - 	Second, decrypt the file data.htm.isc using the password 
that is 
binary number that corresponds to 22. Use the calculator Scientific View 
mode to convert number from binary to decimal and from decimal to binary.
 - 	 Read and follow instructions that are in the file data.htm (after 
decryption you will be able to open the file and read it).
 - 	The goal is to find a list of criminal activities that was hidden.