OK, first things first: let’s start with the basics. I copied the image of the Boss’s laptop from our department’s NAS to my own forensic workstation and started my regular routine. It was easy to detect the operating system, now, let me see what name was used by the laptop owner.