computer forensics exploits electronic discovery traq computer computer repair notebook expert witness vulnerabilities data recovery security file recovery laptop security holes hacking