Adversaries attempt to remove all traces of their activities using several techniques. And many of these can also be used by human and land rights activists protecting themselves from petty tyrants.
Encrypt keystrokes with tools such as Keyscrambler to prevent a key logger from recording their IP address, Mac address, open ports, operating system, installed applications, default web browser, visited URLs, making screenshots …
Create a locked screen saver to prevent live forensics
Disable and remove USB logs
Disable time stamps
Disable System Restore Points (Windows)
Disable Debugging Upon Failure (Windows)
Disable Event Logging (Windows)
Disable sending error reports to third parties.
Hide encrypted files in an encrypted container on an USB stick.
Use SSH (Secure Shell) when connecting to a remote system.
Use high anonymity proxies and VPN's that do not log.
Chain multiple proxies or chain VPN's or use a VPN together with a high-anonymity proxy for an increased privacy advantage.
Spoof and mimic a user-agent to hide the browsers’ identification.
Destroy or alter audit trails to hide tracks of having been on a target.
After a hack, delete any wireless network keys or passphrases, network share passwords and passwords for VPN or dial-up.
After a hack, delete the entire hard drive, and install a fresh operating system from bootable disc or USB drive (erase and format the drive’s partitions) to return to normal function.