Image via Wikipedia
Forensic Software Tools
This post summarizes the features and advantages of a large number of software forensics tools. For detailed information and technical reports it is always best to view the vendor Web sites as well as organizations that conduct technical reviews and evaluations such as National Institute of Standards and Technology (NIST).
The Computer Forensic Tools Testing project (CFTT) web site contains additional valuable information:
The information presented in this chapter is heavily based on the assertions of the various vendors who make the products listed in the chapter. Much of the information has been taken from the vendors product sheets. The Computer Forensic Tools Testing project is a good source of comparative data when deciding between these vendors.
Some of the tools I plan to discuss in my future posts are:
Stay tuned to know more about these 🙂
|
View article…
Related articles
- NIST Releases Federal Cloud Roadmap, Architecture (informationweek.com)
- 4 new reports update Security Content Automation Protocol (eurekalert.org)
- 2 new publications provide a cloud computing standards roadmap and reference architecture (eurekalert.org)
- NIST Releases Federal Risk Assessment Guide (informationweek.com)
- FISMA Draft Guide for Conducting Risk Assessments Released (infosecurity.us)
- NIST’s NICE (infosecurity.us)
- NIST’s Guide for Conducting Risk Assessments (superconductor.voltage.com)
- NIST Needs NICE Notes (novainfosecportal.com)
- NIST Publishes Cloud Computing Roadmap (infosecurity.us)
- NIST tests help ensure reliable wireless alarm beacons for first responders (physorg.com)
- Symantec, VMware Pledge Secure Desktop-As-A-Service Offering (portadiferro2.blogspot.com)
- IT Security & Network Security News & Reviews: Google’s Expanded Privacy Tools … (portadiferro2.blogspot.com)
- Hacker to Demonstrate ‘Weak’ Mobile Internet Security (portadiferro2.blogspot.com)
- Report: Chinese military developing cyberwarfare tools (portadiferro2.blogspot.com)
- IT Security Pros Worry About APTs, but Can’t Change User Behavior (portadiferro2.blogspot.com)
- HP expands enterprise security portfolio with digital vaccine toolkit (portadiferro2.blogspot.com)
- SpyEye Hacking Tool Now Accessible To The Criminal Masses (portadiferro2.blogspot.com)
- Advanced Malware, Targeted Attacks Compromise Enterprises via … (portadiferro2.blogspot.com)
- Degree of foresight as police forces learn to tackle cybercrime (portadiferro2.blogspot.com)
- Don’t Blame the Domain: Where Internet Bad Boys Aren’t Hiding (portadiferro2.blogspot.com)
Related Posts via Taxonomies
To the official site of Related Posts via Taxonomies.
Discover more from The Puchi Herald Magazine
Subscribe to get the latest posts sent to your email.
Forensic Software Tools by The Puchi Herald Magazine is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.