This paper presents a wealth of information, ranging from basic, all the way to advanced techniques used in defeating forensic analysis from affecting your network. Why is this important? Because as the tools for protection become more sophisticated, so do the tools for unwanted analysis, and forensics is one of the most growing aspects in security. This is a solid overview and serve as a great resource to find out what forensics is, what it does, where it's going, and what you can do to stop it. Includes the following topics: - What is computer forensics? - What is Anti-Forensics? - Anti-Forensics methods: Encryption. Steganography. Self Split Files + Encryption. Defeat