The Different Techniques in Computer Forensics Investigations Computer forensics Jacksonville is mainly giving a service that is focused in retrieving evidences from a computer. This is also the same thing that computer forensics Tampa gives out for its clients. There are different steps that are being taken when this service is given out to the clients. Ad a lot of these steps vary according to the technique that is available for the situation. In this article, you will find the different techniques that computer forensics Jacksonville and computer forensics Tampa use in order to get the best out of the computer that they are checking. But before that, you need to understand that computer forensic has different techniques that are being used depending on the damage, the situation and the type of computer that is being considered. Here are the different techniques and their corresponding explanation: • The cross-drive analysis. This is being used mainly when the problem lies on the social media. This is still one of the techniques that are being developed and is undergoing improvements at the moment but this is now fully functional. This is being used in order to find anomaly in the social media. With cross drive analysis, the investigation happens in multiple hard drives. This is what is making this process unique. The investigators are looking at different hard drives. • The Live analysis. This is the type of analysis and technique wherein the main purpose of the team is to check the operating system in order to extract evidence. This is mainly used when the investigators are looking at a problem that has something to do with Encrypting file systems. The logical hard drive will be undergoing live acquisition in order for them to get the data that they need. This process is going to happen before the computer is going to shut down. • Retrieval of deleted files. Among all the techniques that are being used by the forensic investigators, this is the most common. The retrieval of information is going to be done even when there is damage in the storage or there had been a deleted file that should be retrieved. With this, all you need to understand is that the computer has its very unique way to