This document appears to be a lecture on digital forensics topics related to application analysis. It discusses analyzing email, web browsers, Microsoft Word documents, PDFs and IRC communications for metadata and hidden data. Specific tools are mentioned for extracting information from email clients, browser caches and history, cookies, Word documents, and IRC logs. The document also outlines various types of hidden application data and what can potentially be discovered from analyzing applications and files.