Quote from: alonetraveler on October 09, 2012, 03:45 amI've been in the Information Security and Digital Forensics fields for almost 15 years, both federal and private sectors. I would like to know what burning questions or concerns you have when someone like me has access to your computers and/or mobile devices.The first piece of advice I can give you is to always do your business off of a live, linux-based CD. For those in the US, buy a laptop off of Craigslist, remove the hard drive and exclusively use boot CDs. You will also want to regularly change the MAC address of the network device you are using. Also, NEVER use a wifi hotspot that has cameras. In the offhand chance that we are able to track down your activities to a specific place, we have and will use the business's security cameras to identify you if you're a suspect.Good advice, although all of this has been discussed previously. Just out of curiosity, what brings you to this neck of the woods?