Computer Forensics Courses Uni


Advertisement

Tableau Tabtest  v.1 2


After the user connects a Tableau forensic bridge to the host computer, TabTest automatically detects the model of the forensic bridge and begins the appropriate test procedure.

Thumbs.db Viewer Pro  v.3.6

db Viewer was written to give the computer user tools to reconstruct Thumbs.db, ehthumbs.db, thumbcache_*.db (Windows Vista,Windows 7) and iconcache_*.db (Windows 8/10) database records.
Thumbs.db is a hidden system file generated automatically by ...





Advertisement

Peak Limiter  v.1 53

Softly compresses single peaks exceeding a user-defined level in such a way that the result cannot be distinguished from the original by the human ear. This permits rising the main volume of the sound file considerably without causing clipping or distortion! ...

WebCase  v.1.0

WebCase was designed by experienced law enforcement professionals to help you collect Internet information in a usable, evidentiary, reportable manner. Built to manage the cases you initiate online, it was designed specifically to:
- Simplify the ...

ProDiscover Basic  v.7.0.0.3

ProDiscover Basic edition is the free member of the ProDiscover family for hard disk security examination. It may not be as comprehensive as the other two products in the family, but it will give you an idea of the great potential these suite of products ...

Hash  v.4.0

Forensic examiners often need to quickly obtain the hash values for potential evidence files for reports or to verify their results. Pinpoint Hash was created to allow users to quickly obtain the hash values for CRC-32, MD5, SHA-1 and SHA-256 hash values ...

CacheBack  v.2. 7. 2004

Rebuild cached web pages and examine Internet histories for Internet Explorer. View cached web pages AND pictures in a single consolidated thumbnail gallery making it easy to zero in on artifacts of interest. Import pictures and movies directly from local ...

OPC-5000E  v.5.0

The OPC-5000E software combined with the USB port provides the ability to store and compare multiple Peak Traces from previous sweeps, adjacent rooms, and real-time OSCOR data. This high resolution data is easily manipulated for analysis.

...

Mailbag Assistant  v.4 1

It reads and processes your current and archived e-mails with ease, whether they are stored on your computer, on networked drives, or on removable media like USB keys and flash drives.

With Mailbag Assistant, you can:

- open all ...

PageTranslator  v.1.0

Google has created a fantastic set of tools to allow you to
translate any web page from one language to another. However,
for most, it is a bit difficult to integrate into your existing site.

PAGE TRANSLATOR does all the work for you! ...

Mobile Phone SMS Recovery Tool  v.5.0.1

SIM card data recovery software is helpful in computer forensics. SIM card data recovery and repair software displays sim card ICC mobile identification number and service provider name. SIM card forensics tool recover lost contact numbers freeware sim ...

Undelete Freeware  v.4.0.1.6

Data recovery application can be used as efficient tool in computer forensics and various other sectors including IT, companies, banks, schools etc. FAT file restoration utility facilitates to restore inaccessible, virus infected photo albums from hard ...

PowerWebTools  v.2.0

PowerWebTools is an exciting new design interface with a collection of
scripts for WebMasters to use to help enhance their website. Included
are tools you can use offline, like a custom text editor with html syntax
highlighting and browser ...

Logisim  v.2.7.1.244 Unstable

Logisim is used by students at colleges and universities around the world in many types of classes, ranging from a brief unit on logic in general-education computer science surveys, to computer organization courses, to full-semester courses on computer ...

X-Ways Davory  v.2.03

Davory undeletes files and recovers files from logically corrupted or formatted drives. Incorporates some of the data recovery techniques from WinHex and concentrates on ease of use. Offers two separate, fully automated data recovery mechanisms to maximize ...

Pages : < 1 | 2
Newest Reviews