Network information will reveal all networks the computer was connected too including all intranets and wireless connections. The attached devices will reveal all USB, DVD/CD, media, etc. devices that have been connected to this computer also helping tie an unknown USB device to a particular computer. The history list will give an investigator all information about a user's latest activity including which files have been opened, modified, created, and websites visited. Windows registry stores data in binary code based on the application structure. Some applications can cause forensic analyst trouble as different applications can use different structures to store it and offenders can use this to help confuse investigators or to hide
Network information will reveal all networks the computer was connected too including all intranets and wireless connections. The attached devices will reveal all USB, DVD/CD, media, etc. devices that have been connected to this computer also helping tie an unknown USB device to a particular computer. The history list will give an investigator all information about a user's latest activity including which files have been opened, modified, created, and websites visited. Windows registry stores data in binary code based on the application structure. Some applications can cause forensic analyst trouble as different applications can use different structures to store it and offenders can use this to help confuse investigators or to hide