"Computação Forense"
Follow
13.6K views | +36 today
"Computação Forense"
Tecnologia e Computação Forense - Computer Forensics
Curated by João Carvalho
Your new post is loading...
Your new post is loading...
Rescooped by João Carvalho from Best Freeware Software
Scoop.it!

XXCLONE, A New Way of Cloning the Windows System Disk

XXCLONE, A New Way of Cloning the Windows System Disk | "Computação Forense" | Scoop.it
XXCLONE is a simple tool to clone the system disk for Windows.

 

- XXCLONE copies (clones) your Windows system disk into another disk with the system files, installed applications, and all of your data files.


- It is an ideal tool for periodic system disk backup on a regular basis.


- It makes the target disk Self-Bootable that can replace your main disk without further steps (such as the Restore procedure).


- It can migrate your Windows disk into a new one with a different capacity (typically to a larger one).
Our proprietary HyperSync algorithm makes the periodic backup operation extremely fast.


- XXCLONE operates inside the Windows environment which allows you to use your computer while XXCLONE runs in the background.


Via Gust MEES
more...
No comment yet.
Rescooped by João Carvalho from Best Freeware Software
Scoop.it!

CAINE Live CD - computer forensics digital forensics

CAINE Live CD - computer forensics digital forensics | "Computação Forense" | Scoop.it
CAINE Computer Aided INvestigative Environment Live CD, computer forensics, digital forensics...

Via Gust MEES
more...
Rescooped by João Carvalho from Best Freeware Software
Scoop.it!

Event Log Explorer

Event Log Explorer | "Computação Forense" | Scoop.it

Event Log Explorer™ is an effective software solution for viewing, monitoring and analyzing events recorded in Security, System, Application and other logs of Microsoft Windows operating systems.

 

Event Log Explorer greatly extends standard Windows Event Viewer monitoring functionality and brings many new features.

 

It is impossible to find a system administrator, security specialist, or forensic examiner for whom the problem of event log analysis has never been acute. To keep your network safe and sound you have to constantly trace valid and invalid logon attempts, events related to resource use, such as creating, opening, or deleting of files, etc.

 

This process of monitoring event logs has always devoured a lot of time.


Via Gust MEES
more...
No comment yet.