Hackers, 26, 44, 60, 453–5
Handheld devices, 339
collection and examination of, 344–52
data storage and manipulation, 339–41
forensic analysis of, 337
memory, 339
overview of, 338–44
Handle, 531
Harassment see stalking
Hard drive removal, 196
Hardware, 34, 664
as contraband or fruits of crime, 35
duplication devices, 227
as evidence, 36–7
as an instrumentality, 36
system damage, 291
Harvesting of potential digital evidence, 109
Hash Values, 633
Hashkeeper, 635
Hashl, 297
HAVAL, 219
Headers, 110, 176, 244, 267
database, 340
e-mail, 393, 402, 456, 483
record entry, 340
TCP/IP, 423, 473
Usenet, 486
Heaplist, 341–3
Heaps, 339–40
Hearsay and digital evidence, 179–83
exceptions, 181
Henriques, Bart, 576
Hexadecimal editor, 270
Hexadecimal representation of data, 198
Hexdumpl, 297–8
HFS see Macintosh
Hibernation files, 238
Hidden data recovery, 238, 346
High risk victim, 664
Hillyard, Richard, 603
History.dat, 316
Hives see Registry files
Hollinger's crime, deviance and the computer, 26
Homicide, 11, 16, 31, 136, 140, 159, 162, 221, 378, 619
Hosts, 319, 361–3, 365–6, 664
communication, 369–73
Hotline Client, 379
Hotline Server, 379
Hotmail, 97, 410, 437, 507
HotSync, 347–9, 353
HP-UX, 289, 293
Htdig, 491
Httrack, 491
Hubs, 362, 459
Hushmail, 409, 498
Hyperterminal, 396, 431
Hypertext Transfer Protocol (HTTP), 363
Hypothesis formation, 103