Watch this video on YouTube
Fill in the blank: To cover their tracks, hackers often use _______ to manipulate logs.