This document discusses the rules of computer forensics and types of computer forensic evidence. It outlines three main rules for computer forensic processes: rules for admissibility of evidence which requires evidence be relevant, identifiable, and authentic; rules for chain of custody which tracks who accessed evidence and when; and rules for evidence integrity which ensures evidence is not altered through techniques like hashing. The document also notes that computer forensic investigations follow a methodology to collect, preserve, and analyze potential evidence from various digital sources like hard drives, RAM, emails, and web histories.