In both cases, it is worth highlighting that lot of suspicious traces, such as information about the controller machine,
MAC or IP addresses of the KVM, may be recorded by other components of the network, such as DHCP, NAT and DNS
servers. An analysis of caches and logs of these systems may reveal with no doubt an anomalous connection lasting for the
entire alibi timeline. Although the AM has the possibility of being very far away from the potential alibi location, the main
limitation of the Remotization approach is the necessity of human intervention.