Watch this video on YouTube
How should a desktop computer involved in a computer security incident be secured as evidence?