|
||||||
|
||
|
Home > Forensic software |
|
|
1. | Data Destroyer 7.31 (hermetic.ch) | ||
be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery). In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges | |||
Updated: 2, 2006 | Rating: 16 | Author: Peter Meyer | Size: 1826 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
2. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
folder mass update of Office file properties. May be useful for forensic purposes. Cataloging tool to extract file properties, metadata from files images or web pages in directories into HTML, XML files. Interactive interface filters by file and properties type. Command line creates XML and apply XSL transformations in batch | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
3. | Directory Snoop 5.02 (briggsoft.com) | ||
Directory Snoop is a cluster-level search tool that lets Windows users snoop through their FAT and NTFS formatted disk drives to see what data may be hiding in the cracks. Use Directory Snoop to recover deleted files you thought you would never see again or permanently erase sensitive files so that no one | |||
Updated: 2, 2006 | Rating: 0 | Author: Kent Briggs | Size: 1534 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | Web Cache Illuminator 4.8.2 (nstarsolutions.com) | ||
you're a computer forensic professional or you just want to investigate what web sites someone has been visiting, the Web Cache Illuminator makes the task much easier. Just point and click to the web cache folder and it will create a meaningful list that not only displays all the file names in the cache; but, more importantly, displays the title given by the web page's creator | |||
Updated: 2, 2006 | Rating: 0 | Author: Jeff Camino | Size: 491 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
5. | HDR-Data For Fat16, Fat32 And NTFS 3.0 (hdrdatasoftwares.com) | ||
aggressively without fear of permanent damage to data, and allows forensic specialists to make true discovery copies of the hard disk! Safe, same day solution Economical, easy process - ready to use, no need to have software pre-installed prior to use. Individual packages or product bundles to support most operating | |||
Updated: 9, 2005 | Rating: 0 | Author: Farooq Siddique | Size: 732 kb | Demo Go to category: System Utilities > Other Similar programs | |||
6. | Mutilate File Wiper 2.92 (home.att.net) | ||
The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files from your hard drive by data recovery or | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
7. | Privacy Guard 1.4 (amicutilities.com) | ||
still be recovered using expensive hardware and software which use forensic latency track analysis algorithms. Privacy Guard securely erases the records of your computer activity and all the unwanted files, using complex algorithms which make sure that it can never be recovered. Truly remove all | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1183 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
8. | Privacy Guard 1.2 (amicgames.com) | ||
still be recovered using expensive hardware and software which use forensic latency track analysis algorithms. Privacy Guard securely erases the records of your computer activity and all the unwanted files, using complex algorithms which make sure that it can never be recovered. Truly remove all traces | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1183 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
9. | Disk Investigator 1.32 (theabsolute.net) | ||
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Solway | Size: 522 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
10. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file shredder or file eraser that securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Forensic software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|