![]() Create & Compare Drive Signaturesīy making a record of the details of the files on a hard drive a comparison can be then done at a later date to find out what has been changed. This can help locate “Dark Data” that the user has tried to conceal. This identifier can be used both to verify a file has not been changed or to quickly find out if a file is part of a set of known files.īy looking at the contents of a file OSForensics can identify what kind of file it is and then figure out if the file has an incorrect extension. Using advanced hashing algorithms OSForensics can create a digital identifier that can be used to identify a file. Identify suspicious files and activity Verify and Match Files Remove or create an image of the hidden areas for further analysis. Attempt to expose sensitive information that would otherwise be inaccessible. Websites in common web browsers, including Internet Explorer, Firefox, Chrome and Opera.ĭiscover hidden disk areas (HPA/DCO) of a hard disk. Recover usernames and passwords from recently accessed OSF can also dump their memory to a file on disk for later inspection. Select from a list of active processes on the system to inspect. Attempt to uncover passwords and other sensitive information that would otherwise be inaccessible. Look directly at what is currently in the systems main memory. Detailed information about the hardware a system is running on:Īnd much more. OSForensics can uncover the user actions performed recently on the system, including but not limited to:įind out what’s inside the computer. OSForensics can track down this ghost file data and attempt to restore it back to useable state on the hard drive.įind out what users have been up to. This allows for a fast text content search of any emails found on a system.Īfter a file has been deleted, even once removed from the recycling bin, it often still exists until another new file takes its place on the hard drive. The indexing process can open and read most popular email file formats (including pst) and identify the individual messages. Search for EmailsĪn additional feature of being able to search within files is the ability to search email archives. Powered by the technology behind Wrensoft’s acclaimed Zoom Search Engine. This allows for lightning fast searches for text contained inside the documents. If the basic file search functionality is not enough, OSForensics can also create an index of the files on a hard disk. Results can be analyzed in the form of a file listing, a Thumbnail View, or a Timeline View which allows you to determine where significant file change activity has occurred. OSForensics™ allows you to search for files many times faster than the search functionality in Windows. Discover relevent forensic evidence faster
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |