Discussion Post
It is critical for digital investigators to understand that they will be dealing with malicious computer programs. These programs can potentially cause damage on any computer system on which they reside. What steps can you take to ensure the malicious computer program, that you are testing for an investigation, won't damage your own computer?
The response should include a reference list. One-inch margins, Using Times New Roman 12 pnt font, double-space and APA style of writing and citations.