|
||||||
![]() |
![]() |
|||||
![]() |
||||||
|
||
|
Home > Forensic software |
|
|
11. | Hermetic Stego 5.17 (hermetic.ch) ![]() | ||
so that (i) the presence of the hidden file is undetectable (even by forensic software using statistical methods) and (ii) if a user-specified stego key is used then the hidden file can be extracted only by someone, using this software, who knows that stego key. Hermetic Stego allows two operations | |||
Updated: 9, 2005 | Rating: 42 | Author: Hermetic Systems | Size: 1896 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Innovatools ComputerWatermark 1.5 (computerwatermark.com) ![]() | ||
your information using any simple disk editor, unerase program, or forensic tools. Also, if you have a friendly dispute (in your family, organization, office, university, etc.) or a more serious dispute with legal implications, you can easily prove you own the computer or the hard disk, as your name will be all over the disk. ComputerWatermark writes your name and address (or other | |||
Updated: 9, 2005 | Rating: 0 | Author: Dan Dominic | Size: 1119 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
13. | Disk Investigator 1.32 (diskcleaners.com) ![]() | ||
Disk Investigator helps you to discover all that is hidden on your computer hard disk. It can also help you to recover lost data. Display the true drive contents by bypassing the operating system and directly reading the raw drive sectors. View and search raw directories, files, clusters, and system sectors | |||
Updated: 9, 2005 | Rating: 455 | Author: Kevin Solway | Size: 350 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
14. | Data Destroyer 1.5 (braintwist-studios.com) ![]() | ||
The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, even when overwritten, by analyzing latent magnetic traces. Data Destroyer is an utility that securely removes the data content from hard drives or partitions in a manner than cannot be undone. It provides secure deletion of | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
15. | Super Recycle Bin 1.00 (4diskclean.com) ![]() | ||
of advanced hardware-based recovery mechanisms such as specialized forensic techniques and electron microscopes. Delete files forever! Super Recycle Bin , Drag and drop files into this icon in your desktop or delete using Explorer Pop-Up . Irrecoverable from any software or hardware tool . Deletion rules conforms to US Department of Defense | |||
Updated: 8, 2004 | Rating: 894 | Author: RSS Systems | Size: 20 kb | Data Only Go to category: Security & Privacy > Other Similar programs | |||
|
Home > Forensic software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|