Handheld devices, 339
collection and examination of, 344–52
data storage and manipulation, 339–41
forensic analysis of, 337
memory, 339
overview of, 338–44
Handle, 531
Harassment see stalking
Hard drive removal, 196
as contraband or fruits of crime, 35
duplication devices, 227
as evidence, 36–7
as an instrumentality, 36
system damage, 291
Harvesting of potential digital evidence, 109
Hash Values, 633
Hashkeeper, 635
Hashl, 297
HAVAL, 219
database, 340
record entry, 340
Usenet, 486
Heaplist, 341–3
Heaps, 339–40
Hearsay and digital evidence, 179–83
exceptions, 181
Henriques, Bart, 576
Hexadecimal editor, 270
Hexadecimal representation of data, 198
Hexdumpl, 297–8
HFS see Macintosh
Hibernation files, 238
Hidden data recovery, 238, 346
High risk victim, 664
Hillyard, Richard, 603
History.dat, 316
Hives see Registry files
Hollinger's crime, deviance and the computer, 26
Homicide, 11, 16, 31, 136, 140, 159, 162, 221, 378, 619
communication, 369–73
Hotline Client, 379
Hotline Server, 379
Htdig, 491
Httrack, 491
Hypertext Transfer Protocol (HTTP), 363
Hypothesis formation, 103