AccessData’s Forensic Toolkit AccessData 2003 and Guidance Software’s EnCase Guidance Software 2003 can use programming HashKeeper Hashkeeper 2003, Maresware Maresware 2003, and National Software Reference Library National Software Reference Library 2003 hash sets programmers look for desktop science large range of program. In regular, these data sets are designed programmers exclude hashes of known “good” files from search indexes during programming desktop forensic analysis. Gargoyle can also import these hash sets. The detection of steganography program continues programmers become harder for another reasonthe small size of programming application coupled with programming increasing storage capability of removable media. S Tools, for example, calls for less than 600 KB of disk space and may be performed at once, with out extra setting up, from laptop technological know-how floppy or USB memory key. Under those cases, no remnants of programming program would be found on programming hard drive. Target Data has unique strategies for making improvements to guidance system functionality. We can enhance programming processes of retrieval, generation of reports, queries, and transfer of data from one database programmers another. All these processes may be made more useful and rapid. This is completed by inspecting programming most and least common processes in programming association, and by specifying priorities by making trade off among programming following standards: Storage area and speed. This is done by constructing search keys as required or deleting keys not required. Saving copies of items of guidance one at a time, so as programmers provide fast access programmers them, as compared programmers saving guidelines programmers these items of guidance, in order programmers save space for storing at programming cost of programming response time required programmers retrieve them.