ABSTRACT

Introduction Today’s cyber forensic investigator has literally hundreds of specifi c and unique application software packages and hardware devices that could qualify as cyber forensic tools. Added to that, the hundreds of utilities available for the same task, the job of identifying and examining the best and most utilized tools are daunting and overwhelming to say the least.