Search results
Results from the WOW.Com Content Network
Essential light weight tool to inspect any type data carrier, supporting a wide range of file systems, with advanced export functionality. Netherlands Forensic Institute / Xiraf [4] / HANSKEN [5] n/a: proprietary: n/a: Computer-forensic online service. Open Computer Forensics Architecture: Linux: LGPL/GPL: 2.3.0: Computer forensics framework ...
Digital forensic tools scan mobile phones, computers and digital devices to collect intelligence or evidence of a crime to identify computers that contain content relevant to an investigation. Triage-G2 is a media exploitation (MEDEX) tool used on computers and peripheral devices.
Computer Online Forensic Evidence Extractor (COFEE) is a tool kit, developed by Microsoft, to help computer forensic investigators extract evidence from a Windows computer. Installed on a USB flash drive or other external disk drive, it acts as an automated forensic tool during a live analysis. Microsoft provides COFEE devices and online ...
EnCase is traditionally used in forensics to recover evidence from seized hard drives. It allows the investigator to conduct in-depth analysis of user files to collect evidence such as documents, pictures, internet history and Windows Registry information. The company also offers EnCase training and certification.
File artifacts and meta-data can be used to identify the origin of a particular piece of data; for example, older versions of Microsoft Word embedded a Global Unique Identifier into files which identified the computer it had been created on. Proving whether a file was produced on the digital device being examined or obtained from elsewhere (e.g ...
Forensic Toolkit, or FTK, is computer forensics software originally developed by AccessData, and now owned and actively developed by Exterro. It scans a hard drive looking for various information. [1] It can, for example, potentially locate deleted emails [2] and scan a disk for text strings to use them as a password dictionary to crack ...
Further, Autopsy parses and catalogues some email and contact file formats, flags phone numbers, email addresses, and files, as well as SQLite or PostgreSQL database stores occurrences of names, domains, phone numbers, and Windows registry files indicating past connections to USB devices. Multiple file systems can be catalogued in the same ...
The Sleuth Kit can be used to examine most Microsoft Windows, most Apple Macintosh OSX, many Linux and some other UNIX computers. The Sleuth Kit can be used via the included command line tools , or as a library embedded within a separate digital forensic tool such as Autopsy or log2timeline/plaso.