Computer Science Homework Help

NAU What Can an Attacker Do with Alternate Data Streams Question

 

I’m trying to study for my Computer Science course and I need some help to understand this question.

What can an attacker do with Alternate Data Streams ?