The document discusses various digital forensic techniques for analyzing a Windows system to uncover evidence. It outlines 10 different avenues of analysis including NTFS attributes, the registry, prefetch files, print spool files, the recycle bin, thumbs.db, event logs, internet history files, shortcut files, and system restore points. Each technique is briefly described with examples of how they can be used to answer questions about "who, when, why and how" on a system.