I recently had the opportunity to perform some basic computer forensic analysis for clients who wanted to know if their computers had been used for "illicit" purposes. One client, the owner of a ...