background preloader

Recuva - Free Data Recovery tool - Free Download

Recuva - Free Data Recovery tool - Free Download

http://www.piriform.com/recuva

Related:  Network tools

SIFT Kit/Workstation SANS Investigative Forensic Toolkit (SIFT) Workstation Version 3.0 Download SIFT Workstation VMware Appliance Now - 1.5 GB Having trouble downloading? If you are having trouble downloading the SIFT Kit please contact sift-support@sans.org and include the URL you were given, your IP address, browser type, and if you are using a proxy of any kind. Microsoft To ARM Win8 Tablet Makers: No Dual Boot For You This may seem a bit of inside baseball, but it’s a fairly interesting fact for folks looking forward to thin-and-light Win8 devices running ARM chips rather than Intel. According Computer World, devices running ARM versions of Win8 will not be able to run other OSes, like Android, thanks to something called Secure Boot. A version of Secure Boot is built into many mobile devices – namely phones and tablets – in order to avoid bootloader mobile attacks and, obviously, to keep things locked down. Windows Phone, for example, prevents folks from installing anything into the bootloader nor can they run off-brand software. However, folks love them some Linux and for these devices to be completely locked down could disappoint the hacker contingent. Microsoft says that you can disable Secure Boot on larger systems, however, noting in the design documents:

CCleaner CCleaner Optimization and Cleaning CCleaner is the number-one tool for cleaning your Windows PC. It protects your privacy online and makes your computer faster and more secure. Easy to use and a small, fast download. Linux Commando: Splitting up is easy for a PDF file Occasionally, I needed to extract some pages from a multi-page pdf document. Suppose you have a 6-page pdf document named myoldfile.pdf. You want to extract into a new pdf file mynewfile.pdf containing only pages 1 and 2, 4 and 5 from myoldfile.pdf.

ILooKIX: Perlustro Starting with the world’s first Law Enforcement Windows forensics toolset, ILookIX, now redefines the future of computer forensic investigations. Unparalleled in its feature sets, depth of analysis, and ease of use, ILookIX changes the playing field in more ways than any tools have done to date. XFR – Xtreme File Recovery now available for NTFS, FAT HFS, and Extended 4 and 3 linux systems, has no equal in any toolset that exists anywhere. It empowers any end user, from novice to expert, to conduct an investigation quickly, with a reliability scale unmatched in any other tool. At the center of over a decade of investment in quality demanded by intelligence and military agencies, ILookIX now for the first time takes a position as a commercial product.

How to watch Netflix (Watch Instantly) in Linux With Ubuntu 14.04 and Chrome 37 onwards, playing Netflix on Linux natively is now possible thanks to Encrypted Media Extensions and co-operation between Canonical and Netflix. The instructions below are legacy instructions for running Silverlight on Linux via Wine. However, running Netflix is entirely possible in Ubuntu Linux 12.04 and later releases (and most likely any other modern distribution). See the section below "Running with Wine".

FTK FTK is a court-accepted digital investigations platform built for speed, stability and ease of use. It provides comprehensive processing and indexing up front, so filtering and searching is faster than with any other product. This means you can zero in on the relevant evidence quickly, dramatically increasing your analysis speed. The database-driven, enterprise-class architecture allows you to handle massive data sets, as it provides stability and processing speeds not possible with other tools. Furthermore, because of this architecture, FTK can be upgraded easily to expand distributed processing and incorporate web-based case management and collaborative analysis. Data Visualization for Automated Graphical Timeline Construction and Social Analysis Automated graphical timeline construction and analysis of social relationships… two of the most essential but time consuming tasks during an examination.

Mount USB Devices in Virtualbox with Ubuntu Mounting a USB device inside a virtual machine is often a tool that you cannot go without. If you are using Virtualbox in Ubuntu however, you need to take a few extra steps to make it work. Install Virtualbox The first thing you need to do is install Virtualbox from Oracle’s website. It is different than Virtualbox OSE which is included in the Ubuntu repositories because the Virtualbox from Oracle includes proprietary software which allows you to mount USB devices inside you VM among other things. If you already have Virtualbox OSE installed from the Ubuntu repositories, uninstall it before installing the .deb file from Oracle’s website. 25, 465, 587... What port should I use? It's a common question that we receive here at Mailgun. To ensure connectivity to our Simple Mail Transfer Protocol (SMTP) endpoint, Mailgun offers multiple port options, but which one should you use? Let's first take a historical look at each port and then we'll discuss today's methodology for usage. If you're not a history buff, go to "Todays Usage". Historical Perspective

Encase New with Version 7: EnCase Review Package, Faster Processor and More The powerful and efficient features of EnCase Forensic have made it the trusted standard in corporate and criminal investigations, as well as in courts around the world. No other product offers the same degree of functionality, court acceptance, and performance. Software gives visual representation of who’s following you online By Stephen C. WebsterThursday, March 1, 2012 11:08 EDT A new piece of software released this week by browser-maker Mozilla does something unique: it provides a real-time visualization of who is tracking your movements online.

Google Hacking Diggity Project – Bishop Fox Sometimes, the best defense is a good offense. Bishop Fox’s attack tools for Google Hacking level the playing field by allowing our clients to find information disclosures and exposed vulnerabilities before others do. Arm yourself with our arsenal of attack tools that leverage Google, Bing, and other popular search engines. SearchDiggity SearchDiggity v 3

Yes, only used it a few times too … mainly when friends wipe their camera's SD cards. by matthewbridges Jan 16

Related: