Extract digital evidence from suspects' hard drives. Recover hidden and destroyed evidence with Data Carving. Extract difficult to recover artifacts with Live RAM analysis. Supporting more than 250 types of artifacts, Belkasoft Evidence Center Pro can extract Web browsing data including favorites, history and cookies, instant messenger communications, chats, office documents, and many more types of evidence.
The Professional edition of Belkasoft Evidence Center enables forensic investigators to extract many types of digital evidence in a forensically sound way. The forensic investigation tool detects all major office documents, Web browsing histories including cookies and bookmarks created by all popular Web browsers, online chats instant messenger communication in more than 70 clients, email messages and attachments in all popular formats, social networking and gaming communications and many other types of evidence.
In addition, Belkasoft Evidence Center Pro comes equipped with algorithms allowing the product to detect encrypted files and perform a comprehensive search for destroyed evidence.
The Pro edition of Belkasoft Evidence Center supports Data Carving and Live RAM analysis, allowing investigators to discover more digital evidence than ever. Data carving analyzes the entire hard drive in low-level mode, searching for deleted files and discovering many types of destroyed evidence by their signatures or characteristic structures.
Live RAM analysis helps investigators recover certain types of digital evidence from computer's memory dumps, hibernation files and page files. Carving memory dumps allows discovering evidence that's never been written to the hard drive such as conversations, online chats, social networking activities and other types of communication with disabled or unavailable logs.
What is new in this release:
Version 5.2 build 465 allows the product to fully employ computational abilities delivered by multiple-core CPUs. The use of multiple CPUs and CPU cores speeds up the detection and collection of digital evidence, and reduces the time required to analyze big hard drives and process larger amounts of information. However, even users of single-core CPUs will benefit from the new engine by enjoying multi-threaded scanning and background evidence collection.
Limited number of digital evidence artifacts returned
Like it? Share with your friends!
Other Windows Software of Developer «Belkasoft»:
Belkasoft Mail Analyzer Belkasoft Mail Analyzer and Belkasoft Outlook Analyzer products allow for searching and analyzing various mailbox histories.
Belkasoft Forensic Carver Professional Belkasoft Forensic Carver allows for retrieving deleted information from hard drives and analyzing Live RAM in memory dumps. It helps you to search for various artifacts of a user's online activities like chatting, surfing, emailing.Requirements:Microsoft.
Belkasoft Forensic IM Analyzer Ultimate Belkasoft Forensic IM Analyzer Ultimate allows you to extract your IM history into plain text, HTML, and XML formats. Search is supported simple search by word or phrase and advanced search using file with suspect word or using regular expression which is
Belkasoft Popup Suppresser Belkasoft Popup Suppresser is a small utility to close or minimize unwanted popup windows by their title automatically. With this little program installed on your computer, windows like nag screens or bothersome Windows Automatic Updates reboot reminder wi
Belkasoft IM History Extractors Belkasoft Yahoo! Messenger History Extractor allows you to extract your Yahoo! Messenger history into such formats as plain text, HTML and XML. Using Belkasoft Yahoo! Messenger History Extractor you can select the time period of interest, generate history
Belkasoft Outlook Analyzer Belkasoft Outlook Analyzer is an application which helps you to investigate and extract messages from Outlook mailboxes.
Belkasoft Forensic IM Analyzer Home Tool for forensic professionals that eases their work on analyzing Internet Messengers histories. Good for parental control as well. No password required. Supports various IMs: ICQ versions from 97a up to ICQ 6, MSN Messenger, Yahoo! Messenger, &RQ, Mirand
Belkasoft QQ Analyzer Belkasoft QQ Analyzer allows you to search and analyze QQ messenger histories. QQ version 2008 and earlier supported. No password required. Export to text, html and xml formats. German and Chinese translations available.Requirements:Microsoft.NET Framework
Belkasoft Skype Analyzer Pro Tool helps extracting and analyzing Skype chat histories. Belkasoft Skype Analyzer enables you to extract the history and save it as XML, text or HTML format.
Search is supported - simple search by word or phrase and advanced search using file with
Belkasoft Browser Analyzer Professional Belkasoft Browser Analyzer allows you to search and analyze various Internet Browser histories.It support All popular browsers.it can retrieve URLs, passwords and cookies.it doesn't required to be logged under history owner.No write access to a drive requi
1PrivacyProtection 1PrivacyProtection is a privacy protection application that is meant to provide the user with maximum privacy protection set of tools - all combined in a way that will allow the non-technical users to maintain a worries-free computer.
As you use your PC
Leo Folder Locker Leo Folder Locker is a free/freeware folder locking software specially designed for those who want to secure there important data in just a simple folder. This folder locker software creates a secure folder user puts its important stuff in it and then that
Disconnect With over 3 million customers, Disconnect is the easiest way to protect your privacy on all of your devices - iOS, Android, Mac, and Windows
Disconnect protects your privacy in 6 ways. First, it lets you see all of the invisible tracking and unsecured
Blur (formerly DoNotTrackMe) for Chrome Stop forgetting passwords and generate tough-to-crack new ones:. Creates strong encrypted passwords in one click. even for sites you already have logins for. Saves, encrypts and organizes your passwords. Logs you in fast. Works seamlessly across your iPhon
Hidden Fixer Have you ever been infected by shortcut viruses ? They hide all your important files and folders and place the fake files and folders as the shortcuts. This problem mostly happens on your external drives or other kind of storage devices. Every time you cli
Protect Folder Protect Folder is a utility used to lock your folders. Lock your personal folders with or without password to block other users of your system to open. It integrates into the folders context menu in order to quickly help you locking or protect and unlockin
IsisSoft Folder Eclipse Folder Eclipse is a quick and easy way to protect sensitive information on your computer from children, employers, and anyone else who uses your computer, including hackers. This software will hide your sensitive files so that they can't be seen or accesse
Torifier (64-bit) Torifier lets you tunnel software applications through Tor without the need to reconfigure them. An application is not required to have native proxy support in order to work with Torifier. Torifier is a Tor bundle, meaning the program will install the Tor
Image Processor The point of steganography is the fact that nobody will ever try to look for the secret file that was created, because "they" have no reason to believe that it exists in the first place. The process of encrypting data typically produces chunks of illegible
Blur (formerly DoNotTrackMe) for Safari Stop forgetting passwords and generate tough-to-crack new ones:. Creates strong encrypted passwords in one click. even for sites you already have logins for. Saves, encrypts and organizes your passwords. Logs you in fast. Works seamlessly across your iPhon
Supported Operating Systems:
Windows 2000 |
Windows 2003 |
Windows 7 |
Windows Vista |
Windows XP |
Comments on Belkasoft Evidence Center 2013:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10