June 17, 2021

New version of Elcomsoft Distributed Password Recovery

New version of Elcomsoft Distributed Password Recovery has released. The new version of Elcomsoft Distributed Password Recovery is able to create a queue for attack to multiple password-protected files.

Elcomsoft Distributed Password Recovery is a high-end solution for forensic and government agencies, data recovery and password recovery services and corporate users with multiple networked workstations connected over a LAN or the Internet.

More information is available here.

New Cyber Forensic Investigation and System Integrity Software Released; Secure Hash V1.0 Available Today

Released today, a new Windows application to generate digital signatures and verify system integrity. Essential for cyber forensic investigation and useful as an additional security measure ensuring that your system has not been tampered with.

Secure 1st, the network security and cyber forensic specialists, are pleased to announce the release of Secure Hash V1.0. This new Windows application is designed to generate, store and analyse digital signatures. These digital signatures can then be used during a cyber forensic investigation to insure the integrity of the investigation.

[ad code=6 align=left]

Secure Hash scans the hard disk (or any storage media) on a Windows PC and calculates the MD5 and SHA1 hashes of the files and builds a list with other vital information such as file size, location, date of creation and date of modification. The resulting list can be used during a cyber forensic investigation. For example, the investigator may use Secure Hash to save the names, locations and hashes of all the files on a PC during the first stage of the investigation, after the PC has been removed from the crime scene. Later, the investigator could use this information in a court of law or in a lab to generate a report and file list to insure the integrity of the investigation.

Secure Hash also allows for analysis and comparison of the digital signatures. A previously generated list of hashes can be loaded and various filters applied to compare the previous list with the current file states. With filtering, it is easy to discover if any files have been modified, created or deleted as well as finding duplicate files.

“We are very pleased to announce Secure Hash,” said a company spoke person. “This is a simple to use but yet powerful tool. It really is an essential application for anyone doing any kind of cyber forensics.”

Secure Hash is 100% compatible with all versions of Microsoft Windows from Windows 95 to Windows 7 including the 64 bit variants.

About Secure 1st

Secure 1st is an information security company which specializes in Computer Forensic Solutions, Computer Forensic Training Services, and Computer Forensic Consultancy Services. Secure 1st helps its clients to develop and maintain an integrated security infrastructure that can prevent and minimize the effect of possible security lapses.