Both manual and automated programs should be utilized by investigators to reveal hidden and deleted files, unlock encrypted files, and detect steganography. Some examples of softwares that can be employed are WetStone Technologies' Gargoyle software (formerly StegDetect), JP Hide-and-Seek (JPHS), and AccessData's Forensic Toolkit.