Forensic Explorer Crack
Description
Forensic Explorer is a tool for the preservation, analysis and presentation of electronic evidence. Primary users of this software are law enforcement, government, military and corporate investigations agencies. It combines a flexible graphic user interface (GUI) with advanced sorting, filtering, keyword searching, previewing and scripting technology. It enables investigators to:
- Manage the analysis of large volumes of information from multiple sources in a case file structure
- Access and examine all available data, including hidden and system files, deleted files, file and disk slack and unallocated clusters
- Automate complex investigation tasks
- Produce detailed reports, and
- Provide non forensic investigators a platform to easily review evidence.
Key Features:
- Live Boot: Boot forensic image files, including Windows (all versions) and MAC. Learn more about Live Boot
- Shadow Copy analysis: Easily add and analyze shadow copy files. Learn more about Forensic Explorer Shadow Copy Volumes
- Customizable Interface: The forensic explorer interface has been designed for flexibility. Simply drag, drop and detach windows for a customized work-space. Save and load your own work-space configurations to suit investigative needs
- International Language Support: Forensic Explorer is Unicode compliant. Investigators can search and view data in native language format such as Dutch or Arabic
- Complete Data Access: Access all areas of physical or imaged media at a file, text, or hex level. View and analyze system files, file and disk slack, swap files, print files, boot records, partitions, file allocation tables, unallocated clusters, etc.
- Fully Threaded Application: Run multiple functions and scripts in threads
- Multiple Core Processing: Maximize PC processors for intensive functions like keyword searching, data carving, hashing, signature analysis
- Powerful Pascal Scripting language: Automate analysis using a provided script library, or write your own analysis scripts. Automate tasks such as: Run skin tone analysis on graphics files; Extract user, hardware system information from the registry; Locate and analyze transcripts from Internet chats; etc.