Sometimes you need to see how an application works and behaves on a booted suspect’s computer. For this project, write a short guideline of two to three pages on how to use VirtualBox to start and run applications from a suspect’s disk image. Your research should start with the VirtualBox user guide at http://www.virtualbox.org. For more information, search for terms such as “VirtualBox convert RAW image to VDI” or “convert raw to vmdk.”
PLEASE DO NOT USE JOURNAL OR BOOK REFERENCES. ONLY USE WEBSITES