|
||||||
|
||
|
Home > Forensics software |
|
|
1. | Directory Report 24.2 (file-utilities.com) | ||
Directory compare File compare Displays file owner Computer forensics: Finds encrypted files and directories Computer forensics: Finds protected directories Reports total file size - totaled by file owners Shows directory size without right clicking Shows the largest directories on your computer Powerful filtering enables to narrow down your list of files | |||
Updated: 2, 2006 | Rating: 0 | Author: Allan Braun | Size: 7985 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
2. | Disk Investigator 1.32 (diskcleaners.com) | ||
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors | |||
Updated: 9, 2005 | Rating: 455 | Author: Kevin Solway | Size: 350 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
3. | Disk Investigator 1.32 (theabsolute.net) | ||
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors | |||
Updated: 9, 2005 | Rating: 16 | Author: Kevin Solway | Size: 522 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | FileVault 3.0 (networktoolz.com) | ||
and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files that conceal your most sensitive documents. Send Vault files safely over the Internet safe in the knowledge that only the recipient can open them and that they will be completely meaningless to anyone who may intercept them | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Winalysis 3.1 (winalysis.com) | ||
Monitor for changes to files, the registry, users, groups, services, security policies, and more. Archive Event Logs from multiple machines to a central database. Restore files and the registry from snapshots. Schedule jobs to monitor the network for critical changes, optionally generating alerts using SNMP | |||
Updated: 2, 2006 | Rating: 0 | Author: Steve Fullerton | Size: 3122 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
6. | WinHex 11.26 (winhex.com) | ||
fast, needs little memory and is easy to use. An excellent computer forensics tool. Hex editor, disk editor, and RAM Editor with a lot of features: Concatenating, splitting, unifying, analyzing, and comparing files, flexible search and replace functions, Data Interpreter, template editing, encryption, automation of file editing | |||
Updated: 9, 2005 | Rating: 2950 | Author: Stefan Fleischmann | Size: 727 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Forensics software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|