![]() ![]() Options 53 Index View Browse Index Recent. Solutions 48 Indexing Templates Advanced Indexing Options Search Index Advanced Search Index. View 38 3 Indexing Create Index Indexing Problems and. Search 32 File Name Search Configuration File Name. Management 12 Customizing Report Appearances Add Device Supported Image Formats Supported File Systems Supported Partitioning. Printed: June 2017ģ Contents 3 Table of Contents Foreword 0 Part I Introduction and Overview 7 Part II How to Purchase OSForensics 7 Part III Navigating OSForensics 8 Part IV Features 10 1 Case. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. The publisher and the author make no claim to these trademarks. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Remove or create an image of the hidden areas for further analysis.2 OSForensics All rights reserved. Attempt to expose sensitive information that would otherwise be inaccessible. Recover usernames and passwords from recently accessed websites in common web browsers, including Internet Explorer, Firefox, Chrome and Opera.ĭiscover hidden disk areas (HPA/DCO) of a hard disk. Capture process specific binary dumps for later viewing. Select from a list of active processes on the system to inspect. Attempt to uncover passwords and other sensitive information that would otherwise be inaccessible. View 47 columns of metadata for each process. Look directly at what is currently in the systems main memory. Detailed information about the hardware a system is running on: OSForensics can uncover the user actions performed recently on the system, including but not limited to:įind out what's inside the computer. OSForensics can track down this ghost file data and attempt to restore it back to useable state on the hard drive.įind out what users have been up to. This allows for a fast text content search of any emails found on a system.Īfter a file has been deleted, even once removed from the recycling bin, it often still exists until another new file takes its place on the hard drive. The indexing process can open and read most popular email file formats (including pst) and identify the individual messages. Powered by the technology behind Wrensoft's acclaimed Zoom Search Engine.Īn additional feature of being able to search within files is the ability to search email archives. This allows for lightning fast searches for text contained inside the documents. ![]() If the basic file search functionality is not enough, OSForensics can also create an index of the files on a hard disk. Results can be analyzed in the form of a file listing, a Thumbnail View, or a Timeline View which allows you to determine where significant file change activity has occurred. ![]() OSForensics™ allows you to search for files many times faster than the search functionality in Windows. ![]()
0 Comments
Leave a Reply. |