In general, a computer forensic investigator will use a tool in order
to gather data from a system (e.g. a computer or computer network)
without altering the data on that system.This aspect of an
investigation, the care taken to avoid altering the original data, is
a fundamental principle of computer forensic examination and some of
the tools available include functionality specifically designed to
uphold this principle.