What information do you need to recover when searching a victim’s computer for a crime committed with specific e-mail message?
Internet service provider information
E-mail header
Username and password
Firewall log
Submit