By using the special equipment, we can check the computer and gathering the evidence which was deleted by the user.