Are you aware of every track, trail, and trace you leave behind every time you use your PC? Are you sure that you really deleted that confidential information from your hard drive?If not - read this.
In this guide to computer security, Caloyannides warns readers that "one's PC is the most sought after piece of evidence to be used against one." To combat this invasion, he explains how to identify a