Forensic Solutions: All Listings 

Results 1 - 20 of 189 This Category · All Listings
Filter listings...

srm

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

Vendorelleron
Pricing ModelGPL
Modified

ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.

Vendornester
Pricing ModelGPL
Modified

Overwrite is a UNIX utility that try to make harder data recovering. What overwrite does is to overwrite files using random patterns and deterministic patterns, as suggested in the Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-Sta ...

VendorSalvatore Sanfilippo
Pricing ModelGPL
Modified

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

VendorDark Horn
Pricing ModelFreeware
Modified

Diskzapper Dangerous automatically begins erasing all the disks as soon as the booting process is completed. No user action is required. This was intended to be used on computers for which it is not convenient to plug in a keyboard and monitor.

VendorPhil Howard.
Pricing ModelCOMMERCIAL
Modified

BCWipe can be run from My Computer as well as from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with the US DoD 5200.28-STD standard and Peter Gutmann wiping scheme. You can also create and use you own customized wiping ...

VendorJetico
Pricing ModelCOMMERCIAL
Modified

Includes file encryption tools that can encrypt with either 3-DES or IDEA.

VendorArne Vidstrom
Pricing ModelFreeware
Modified

Secure IT 2000 is an easy to use, feature packed, file and folder encryption program based on 448-bit strong encryption using the Blowfish algorithm. It includes a customizable file shredder, and the ability to generate self decrypting email attachments.

VendorCypherix Encryption Software
Pricing ModelCommercial
Modified

CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with ZIP compression. Functions to build self-extracting encrypted ZIP files and e-mail capabilities are also included.

VendorBAxBEx Software
Pricing ModelCOMMERCIAL
Modified

Evidence Eliminator destroys: Windows SWAP file, Windows Application logs, Windows Temporary Files, Windows Recycle Bin, Windows Registry Backups, Windows Clipboard Data, Start Menu Recent Documents history, Start Menu Run history, Start Menu Find Files ...

VendorRobin Hood Software Ltd.
Pricing ModelCOMMERCIAL
Modified

Tracks Eraser Pro is designed to protect you by cleaning up all the tracks of Internet activities on your computer. With only one click, Tracks Eraser allows you to erase the cache, cookies, history, typed URLs, autocomplete memory, index.dat from your br ...

VendorNaval Criminal Investigative Service (NCIS)
Pricing ModelCOMMERCIAL
Modified

The program is designed to "wipe" hard disks to meet Department of Defense standards from the Rainbow series concerning declassification (wiping) of hard disks and cleansing of floppy disks. Declasfy writes the entire disk with hex 0s, then 1s (0xff), the ...

VendorMares and Company, LLC
Pricing ModelCOMMERCIAL
Modified

Invisible Secrets 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files ...

VendorNeoByte Solutions
Pricing ModelCommercial
Modified

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

VendorGuidance Software, Inc.
Pricing ModelCommercial
Modified

EnCase Enterprise Edition is a revolutionary solution providing a platform for comprehensive enterprise wide incident response, information auditing and forensic discovery. Leveraging the powerful functionality of Guidance Software's flagship product, EnC ...

Category Remote Forensics
VendorGuidance Software, Inc.
Pricing ModelCommercial
Modified

Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-validated digital investigations platform delivers cutting-edge computer forensic analysis, decryption and password cracking all within an i ...

VendorAccessData Group LLC
Pricing ModelCommercial
Modified

TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here). Examples of us ...

VendorDan Farmer and Wietse Venema
Pricing ModelOPEN SOURCE
Modified

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

VendorBrian Carrier
Pricing ModelFREEWARE
Modified

snarl is a bootable forensics ISO based on FreeBSD and using @stake's autopsy and task as well as scmoo's list of known good checksums. Once you boot the iso just log in as root there is no password. You will boot into a dialog driven menu. select the fir ...

VendorDave Bullock
Pricing ModelFreeware
Modified

© Computer Network Defence Limited 2019