Forensic Solutions: All Listings 

Results 1 - 20 of 186 This Category · All Listings
Filter listings...

srm

GPL
Pricing Model

srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinking them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examina ...

Modified
GPL
Pricing Model

ya-wipe is a tool that effectively degausses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure that sensitive data is completely erased from magnetic media.

Modified
Salvatore Sanfilippo
GPL
Pricing Model

Overwrite is a UNIX utility that try to make harder data recovering. What overwrite does is to overwrite files using random patterns and deterministic patterns, as suggested in the Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-Sta ...

Modified
Freeware
Pricing Model

Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for ...

Modified
Phil Howard.
COMMERCIAL
Pricing Model

Diskzapper Dangerous automatically begins erasing all the disks as soon as the booting process is completed. No user action is required. This was intended to be used on computers for which it is not convenient to plug in a keyboard and monitor.

Modified
COMMERCIAL
Pricing Model

BCWipe can be run from My Computer as well as from a command-line prompt. BCWipe v.3 is a powerful set of utilities which complies with the US DoD 5200.28-STD standard and Peter Gutmann wiping scheme. You can also create and use you own customized wiping ...

Modified
Arne Vidstrom
Freeware
Pricing Model

Includes file encryption tools that can encrypt with either 3-DES or IDEA.

Modified
Cypherix Encryption Software
Commercial
Pricing Model

Secure IT 2000 is an easy to use, feature packed, file and folder encryption program based on 448-bit strong encryption using the Blowfish algorithm. It includes a customizable file shredder, and the ability to generate self decrypting email attachments.

Modified
BAxBEx Software
COMMERCIAL
Pricing Model

CryptoMite enables you to encrypt, decrypt, and wipe files and folders of any type. It supports various encryption engines, along with ZIP compression. Functions to build self-extracting encrypted ZIP files and e-mail capabilities are also included.

Modified
Robin Hood Software Ltd.
COMMERCIAL
Pricing Model

Evidence Eliminator destroys: Windows SWAP file, Windows Application logs, Windows Temporary Files, Windows Recycle Bin, Windows Registry Backups, Windows Clipboard Data, Start Menu Recent Documents history, Start Menu Run history, Start Menu Find Files ...

Modified
Naval Criminal Investigative Service (NCIS)
COMMERCIAL
Pricing Model

Tracks Eraser Pro is designed to protect you by cleaning up all the tracks of Internet activities on your computer. With only one click, Tracks Eraser allows you to erase the cache, cookies, history, typed URLs, autocomplete memory, index.dat from your br ...

Modified
Mares and Company, LLC
COMMERCIAL
Pricing Model

The program is designed to "wipe" hard disks to meet Department of Defense standards from the Rainbow series concerning declassification (wiping) of hard disks and cleansing of floppy disks. Declasfy writes the entire disk with hex 0s, then 1s (0xff), the ...

Modified
Commercial
Pricing Model

east-tec InvisibleSecrets is a steganography and file encryption software that allows you to encrypt file and folder structures that contain confidential data and hide files, making it completely invisible to any user. Other useful features include: Powe ...

Modified
Invisible Secrets
Guidance Software, Inc.
Commercial
Pricing Model

With an intuitive, yet flexible GUI, and unmatched performance, EnCase Version 4 provides investigators with the tools to conduct large-scale and complex investigation with accuracy and efficiency. Our award winning solution yields completely non-invasive ...

Modified
Guidance Software, Inc.
Commercial
Pricing Model

EnCase Enterprise Edition is a revolutionary solution providing a platform for comprehensive enterprise wide incident response, information auditing and forensic discovery. Leveraging the powerful functionality of Guidance Software's flagship product, EnC ...

Category Remote Forensics
Modified
AccessData Group LLC
Commercial
Pricing Model

Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-validated digital investigations platform delivers cutting-edge computer forensic analysis, decryption and password cracking all within an i ...

Modified
Dan Farmer and Wietse Venema
OPEN SOURCE
Pricing Model

TCT is a collection of programs by Dan Farmer and Wietse Venema for a post-mortem analysis of a UNIX system after break-in. The software was presented first in a Computer Forensics Analysis class in August 1999 (handouts can be found here). Examples of us ...

Modified
Brian Carrier
FREEWARE
Pricing Model

The @stake Sleuth Kit (TASK) allows an investigator examine the file systems of a suspect computer in a non-intrusive fashion. TASK is a collection of UNIX-based command line tools that can analyze NTFS, FAT, FFS, EXT2FS, and EXT3FS file systems. TASK rea ...

Modified
Dave Bullock
Freeware
Pricing Model

snarl is a bootable forensics ISO based on FreeBSD and using @stake's autopsy and task as well as scmoo's list of known good checksums. Once you boot the iso just log in as root there is no password. You will boot into a dialog driven menu. select the fir ...

Modified

© Computer Network Defence Limited 2022