• Clearing logs and removing traces
  • Counter-detection techniques