Steps in computer forensics