How hackers cover their tracks. So let's start by seeing how tracks can be covered over networks....