It also makes it easier to find the files that have been created, accessed and modified during an attack, and it is able to reconstruct deleted files from rawdata found in various hidden parts of a computer's hard disk, such as unallocated space and file slack.