Before You Begin

Deleted Documents: This may or may not lead to valuable information, but is an avenue that must be explored to be thorough. Hidden Information: If steps have been taken to hide data on the machine, this is where we hope to expose it. ................
................