"Forensic software tools and methods can be used to identify passwords, log-ons, and other information that is automatically dumped from the computer memory as a transparent operation of today???s popular personal computer operating systems." . . . .