03.01.2013 Views

Department - Dadra and Nagar Haveli

Department - Dadra and Nagar Haveli

Department - Dadra and Nagar Haveli

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

ZIP/PkZip/WinZip,RAR/WinRAR, ACE/WinACE,<br />

ARJ/WinArj. Corel Worldperfect Office: World perfect<br />

QuattroPro, Paradox;Wordperfect Lighting . Lotus Smart<br />

suit (Organizer, Wordpro,1-2-3 <strong>and</strong> approach). E-mail client<br />

(Microsoft Internet Mail And News, Eudora, The Bat!,<br />

Netscape Navigator/Communicator Mail, Pegasus mail ,<br />

Calypso mail Opera <strong>and</strong> others ). Instant Messengers<br />

(ICQ,ICQLite, Yahoo!, AOL IM, Windows Live<br />

Messenger, Google Talk, Excite Messenger, Trillian <strong>and</strong><br />

many others). Should be updated on a regular basis<br />

includes subscription <strong>and</strong> free technical support.<br />

3 E-mail tracer & e-mail examiner Finds IP address <strong>and</strong> owner /User of an IP address, email<br />

program to reveal the full/unmodified email. Should<br />

retrieve internet cache <strong>and</strong> history with powerful<br />

searching, filtering <strong>and</strong> evidence identification.<br />

3a Email Database Analysis tool Should be table to support all email formats, outlook express<br />

including EDB, STM, PST,OST,MSG,NSF, DBX,MBX,<br />

MBOX,BOX,SML, hotmail <strong>and</strong> yahoo mail HTNL (scraped<br />

from browser caches), should be able to identity <strong>and</strong> recover<br />

permanently deleted <strong>and</strong> encrypted information from email<br />

database, should be able to identify similar copies email<br />

<strong>and</strong> attachment, should be able to search through wildcard<br />

queries, fuzzy queries, Boolean operators, phrase queries,<br />

proximity queries <strong>and</strong> filed specific queries, should be able to<br />

search specific email <strong>and</strong> attachments through the file type<br />

filter, comments, classifications, communication date, list of<br />

hash values , lists of keywords <strong>and</strong> skin tone filtering of<br />

images to identify inappropriate images. Should be able<br />

provide a network view to know communications between<br />

sender <strong>and</strong> receiver <strong>and</strong> indexing information of each word.<br />

Log records, registry. Should be updated on a regular basis<br />

includes subscription <strong>and</strong> free technical support.<br />

4 Cache View Cache view is a viewer for the Netscape Navigator, Mozilla<br />

<strong>and</strong> Internet Explorer caches. You can opened the catched<br />

files for viewing, <strong>and</strong> copy or move them out of the cache.<br />

It will even reconstruct the names of directory paths of the<br />

files for you. Cache view extract the following information<br />

about cached files:URL, Size in (bytes), MIME Type, last<br />

modified date, Date the file was downloaded, <strong>and</strong> the<br />

Expiry date.<br />

5 Directory Snoop Directory Snoop is a cluster-level search tool that allows<br />

Windows users to snoop through their FAT <strong>and</strong> NTFS<br />

formatted disk drives to see what data may be hiding in the<br />

cracks. Use Directory Snoop to recover deleted files you<br />

though you would never see again or permanently erase<br />

sensitive files so that no one will know they ever existed.<br />

Supported media include local hard drives, floppy disks,<br />

6 Steg-Analyzer (Steganography<br />

Analysis Suite)<br />

Zip disks, MO disks, <strong>and</strong> flashcard devices.<br />

Should support real time detection of files associated with<br />

more than 725 Steganography applications. An application<br />

suite for searching <strong>and</strong> detecting Steganography Artifacts<br />

<strong>and</strong> signatures. Should support Steganography applications<br />

search by using CRC-32, MD5, SHA-1, SHA-224, SHA-<br />

256, SHA-384, AND SHA-512 hash values stored in the<br />

Steganography Application Fingerprint Database (SAFDB)<br />

<strong>and</strong> registry entries stored in the Registry Aircraft Key<br />

Database(RAKDB). It should be capable of mounting <strong>and</strong><br />

scanning forensic images of storage media in En Case, ISO,<br />

RAW(DD) <strong>and</strong> SMART formats <strong>and</strong> searching therein. It<br />

should support automated scanning of the Microsoft<br />

Licensed<br />

version<br />

Licensed<br />

version<br />

Licensed<br />

version<br />

Licensed<br />

version

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!