This document summarizes a study on digital forensics. It discusses the tools used in digital forensics including DriveSpy and Forensic Tool Kit (FTK). It outlines the digital evidence collection process as: 1) Identify systems involved and likely relevant evidence, 2) Collect, observe and preserve evidence following order of volatility, 3) Analyze, identify and rebuild evidence while verifying results. Common reasons for needing digital forensics are discussed like unauthorized access, denial of service attacks, and virus/worm/Trojan attacks. Strategies for computer forensics include preserving evidence without altering it, authenticating recovered evidence, and analyzing without modification. Tools like EnCase are also summarized that perform functions like data acquisition