Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1621)
- Business (4269)
- Communications (1275)
- Desktop (188)
- Development (613)
- Education (177)
- Games & Entertainment (714)
- Graphic Apps (690)
- Home & Hobby (107)
- Network & Internet (577)
- Security & Privacy (529)
- Servers (65)
- System Utilities (11779)
- Web Development (292)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
TotalRecall 1.1
A lot of different information about a user's activity is kept within the personal computer. Usually the user does not know about its existence. TotalRecall is a free forensic analysis tool to reconstruct Microsoft Internet Explorer (MS IE) activity and some user's activity on the computer. IE caches URLs which were visited by users. MS IE stores its Internet activity in index.dat files. These files are binary database files, which are used by Microsoft as the file type for storing several different sets of information. Included among these files are user data, Internet cookies, and Internet history storage. These files are found scattered throughout the users' profile folders. Because browser activity files are in binary form, special tools are required to read them. Now, our program investigates: IE activity, IE history, IE cookie, IE favorites and user's activity (recent files and folders, not erased temporary files). After processing, the information from the source is loaded into the appropriate table (all information for the current user may be completed automatically). It is possible to open the file by the program with which it is associated just by double clicking on a selected line of a table. When you select the image from the table its thumbnail is shown at the bottom right corner and it helps you preview the pictures using a built-in viewer. Any table may be sorted by columns in any order. Find-command locates the row of a table containing the regular occurrence of the search string. The table context menu provides quick access to useful commands (Open, Open with?, Open Folder, Copy/Move to?, etc.). The contents of any table may be exported to an .XML or a .TXT file. The program allows collecting data for all tables or for some tables depending upon the criteria set. The program determines the language of your installation of Windows and sets the working language in accordance with corresponding language file (if it exists) then sets it as default.
Specifications:
Version: 1.1 |
Download
|
Similar Products:
Security & Privacy :: Other
Internet Cleaner helps you remove all traces of your online and offline activity, including the list of recently visited sites, browser cache and cookies (IE, Firefox, AOL, MSN, Mozilla, Opera and Netscape Navigator are supported), lists of recent documents in various applications (MS Office, Paint, Media Player, WordPad, Acrobat Reader, ACDSee and more) and protect your privacy by erasing the traces of Messenger, Email, News, P2P programs.
Windows | Shareware
Read More
Security & Privacy :: Other
A program for secure file deletion which overwrites data in specified files so that the data cannot be recovered by any means. A single file can be purged or, in batch mode, multiple files. Selected subfolders of a folder can be purged. The user can specify the type of purge. Purge speed can be tested for an estimation of time required. Can wipe files older than a specified date. Can wipe files in the Windows 7 and 8 Recycle Bin.
Windows | Shareware
Read More
Security & Privacy :: Other
Super USB Port Lock prevents data leaks through devices like USB drives, phones, tablets and other devices that are attached to your computer. It also prevents data leaks through any websites and programs.
Windows | Shareware
Read More
Security & Privacy :: Other
The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
Windows | Shareware
Read More




