2. Before we perform digital evidence, we must learn how machines work 3. How computers process information 4. Binary number system 5. Hash value 6. Check sum 7. Hash algorithm 8. Avalance effect – small change, massive effect into output 9. Computers are extension of ourselves 10. The computer is the crime scene 11. We need a cyber-crime warrant in searching the computer 12. We conduct imaging copy on the copy not the original 13. Sector by sector copy 14. MAC operating system 15. 60 days to finish the examination. 16. Specific and relevant files as evidence 17. Live digital forensics – on site: in the act of doing the criminal activity 18. Post mortem digital forensic – offsite: 19. Dead computer 20. Temporary files no longer in the computer when you transfer 21. Expert: when was the picture taken, device use in capturing, the platform used 22. Existence and integrity of digital evidence 23. Deep fakes 24. Uniform resource locator (FB) 25. Cellebritell, 26. Do you know that it is easy to hack the username and password of facebook www.truecaller.com 27. There are only 6 cyber crime offenses (Section 4-A a. b. c. d. e. 28.