Computer forensic techniques are discussed in depth. There are two sources listed in the bibliography of this three page paper.