|
||||||
|
||
|
Home > Forensic software |
|
|
1. | Disk Investigator 1.32 (diskcleaners.com) | ||
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors | |||
Updated: 9, 2005 | Rating: 455 | Author: Kevin Solway | Size: 350 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
2. | Web Cache Illuminator 4.8.2 (nstarsolutions.com) | ||
you're a computer forensic professional or you just want to investigate what web sites someone has been visiting, the Web Cache Illuminator makes the task much easier. Just point and click to the web cache folder and it will create a meaningful list that not only displays all the file names in the cache; but, more importantly, displays the title given by the web page's creator | |||
Updated: 2, 2006 | Rating: 0 | Author: Jeff Camino | Size: 491 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
3. | MetaDataMiner Catalogue PRO 4.2.19 (peccatte.karefil.com) | ||
folder mass update of Office file properties. May be useful for forensic purposes. Cataloging tool to extract file properties, metadata from files images or web pages in directories into HTML, XML files. Interactive interface filters by file and properties type. Command line creates XML and apply XSL transformations in batch | |||
Updated: 2, 2006 | Rating: 632 | Author: Patrick Peccatte | Size: 2688 kb | Shareware Go to category: Web Development > XML/CSS Tools Similar programs | |||
4. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) | ||
your information using any simple disk editor, unerase program, or forensic tools. Also, if you have a friendly dispute (in your family, organization, office, university, etc.) or a more serious dispute with legal implications, you can easily prove you own the computer or the hard disk, as your name will be all over the disk. ComputerWatermark writes your name and address (or other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
5. | Data Destroyer 1.5 (braintwist-studios.com) | ||
The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, even when overwritten, by analyzing latent magnetic traces. Data Destroyer is an utility that securely removes the data content from hard drives or partitions in a manner than cannot be undone. It provides secure deletion of | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
6. | Directory Snoop 5.02 (briggsoft.com) | ||
Directory Snoop is a cluster-level search tool that lets Windows users snoop through their FAT and NTFS formatted disk drives to see what data may be hiding in the cracks. Use Directory Snoop to recover deleted files you thought you would never see again or permanently erase sensitive files so that no one | |||
Updated: 2, 2006 | Rating: 0 | Author: Kent Briggs | Size: 1534 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
7. | Hermetic Stego 5.17 (hermetic.ch) | ||
so that (i) the presence of the hidden file is undetectable (even by forensic software using statistical methods) and (ii) if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key. Hermetic Stego allows two operations | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file shredder or file eraser that securely deletes sensitive files. Use Mutilate to prevent attempts to recover sensitive deleted files | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
9. | Super Recycle Bin 1.00 (4diskclean.com) | ||
of advanced hardware-based recovery mechanisms such as specialized forensic techniques and electron microscopes. Delete files forever! Super Recycle Bin , Drag and drop files into this icon in your desktop or delete using Explorer Pop-Up . Irrecoverable from any software or hardware tool . Deletion rules conforms to US Department of Defense | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
10. | Disk Investigator 1.32 (theabsolute.net) | ||
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Solway | Size: 522 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Forensic software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|