The new generations of computer application are getting intricate. This is due to the current demand and trend. YouTube Internet application is the nearest example and connecting to it preferably needs broadband. The broadband connection is required for heavy and complex computer applications. High-end computer, broadband network, and complex application are the current technologies of the IT. These technologies are to meet the modern digital lifestyles. New electronic equipments are aspired and as a result, manufacturers are competing and actively introducing their new products.
Combining computer processors to be high-powered computer or supercomputer is probable for well-funded organization. Otherwise, cloud computing could be an option available but the technology and actual cost of it is uncertain. A lot of discussion is ongoing on cloud computing to address this forth-coming technology vulnerability. The option for cloud computing had a discussion on security and privacy. Minqi Zhou et al.  found users concern was not fully sort out and more should be added in terms of five aspects. They are availability, confidentiality, data integrity, control, and audit. The cloud computing solution has created another technical challenge in the digital forensics perspective. The data storage is located in multi places. This setup makes digital evidence acquisition unworkable. It adds up to the intricacy in digital forensics and another need for research. Taken as a whole, how secure is our computer installation remains doubtful. The computer and application deployment are built with security secondary. The concern on its security is little. This mind set has to be changed with computer security as priority for safer usage.
 M.Zhou, R.Zhang, W.Xie, W.Qian, and A.Zhou. “Security and Privacy in Cloud Computing: A Survey,” in Sixth International Conference on Semantics, Knowledge and Grids, 2010, pp. 105 -112.