Previous articleDigital evidence and computer crime for investigatorsNext article Developing a proactive for detection régime