SHAREPOINT

SHAREPOINT
Spotlight on share server 2010

Saturday, November 6, 2010

Cyber Forensic Investigation and System Integrity Software

Secure 1st, network security and cyber forensic specialists, announce the release of Secure Hash V1.0. This new Windows application is designed to generate, store, and analyze digital signatures. These digital signatures can then be used during a cyber forensic investigation to ensure the integrity of the investigation.

Secure Hash scans the hard disk (or any storage media) on a Windows PC and calculates the MD5 and SHA1 hashes of the files and builds a list with other vital information such as file size, location, date of creation, and date of modification. The resulting list can be used during a cyber forensic investigation. For example, the investigator may use Secure Hash to save the names, locations, and hashes of all the files on a PC during the first stage of the investigation, after the PC has been removed from the crime scene. Later, the investigator could use this information in a court of law or in a lab to generate a report and file list to ensure the integrity of the investigation.
Secure Hash also allows for analysis and comparison of the digital signatures. A previously generated list of hashes can be loaded and various filters applied to compare the previous list with the current file states. With filtering, it is easy to discover if any files have been modified, created, or deleted as well as finding duplicate files.
Secure Hash is 100% compatible with all versions of Microsoft Windows from Windows 95 to Windows 7 including the 64 bit variants.
Secure 1st is an information security company which specializes in Computer Forensic Solutions, Computer Forensic Training Services, and Computer Forensic Consultancy Services. Secure 1st helps its clients to develop and maintain an integrated security infrastructure that can prevent and minimize the effect of possible security lapses.Pls do not try secure hash , if you are a starter , its risky for you to identify the rootkit thread.

For more information, visit   http://www.secure1st.com/.

Sincerely
gurbinder sharma

No comments:

Post a Comment