Monday, August 23, 2010

Forensic Toolkit (FTK) Version 3


THE INDUSTRY-STANDARD COMPUTER FORENSICS SOFTWARE USED BY GOVERNMENT AGENCIES AND LAW ENFORCEMENT AROUND THE WORLD

Forensic Toolkit® (FTK®) is recognized around the world as the standard in computer forensics software. This court-validated digital investigations platform delivers cutting-edge computer forensic analysis, decryption and password cracking all within an intuitive and customizable interface. FTK 3 is built for speed, analytics and enterprise-class scalability. Known for its intuitive interface, email analysis, customizable data views and stability, FTK lays the framework for seamless expansion, so your computer forensics solution can grow with your organization’s needs. Forensic Toolkit 3 is now the most advanced computer forensics software available, providing functionality that normally only organizations with tens of thousands of dollars could afford.

Download: http://www.accessdata.com

See also Review: Access Data Forensic Toolkit (FTK) Version 3 — Part 1

Sunday, August 8, 2010

BackTrack 4 Release 1


The BackTrack Team is proud to announce the public release of BackTrack 4 R1.At the risk of sounding like a broken record,we believe this version is by far the best version released to date.With a shiny new 2.6.34 kernel,there are many significant improvements,such as expanded hardware support,and improved desktop responsiveness

Tools have been updated systemwide, and a full Fluxbox desktop environment has been added.A walk-around for the rt28xx driver has been implemented (for all you AWUS050NH owners).
The VMWare version has complete integration with VMWare Tools,which provides a seamless interaction with BackTrack in a virtual environment.

More info and download: http://www.backtrack-linux.org

Monday, August 2, 2010

OWASP O2 Platform v1.1 Beta


The OWASP O2 Platform is an OWASP Project which is a collection of Open Source modules that help Web Application Security Professionals to maximize their efforts and quickly obtain high visibility into an application's security profile.The objective is to 'Automate Application Security Knowledge and Workflows"

Download: Here

Documentation: http://www.o2platform.com
Certified Ethical Hacker Network Security Internet Security Computer Security Wireless Network Security