Licitware a forensic software tool designed to investigate computer crimes.

Slides:



Advertisements
Similar presentations
Collaboration Model for Law Enforcement X-Ways Investigator (investigator version of X-Ways Forensics)
Advertisements

United Software Associates Best Minds Together United Software Associates Best Minds Together Welcome to… Presentation on Information Technology Services.
Max Secure Software founded in Jan 2003 develops innovative privacy, security, protection and performance solutions for Internet users. The company is.
Effective Discovery Techniques In Computer Crime Cases.
Network and Server Basics. 6/1/20152 Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server.
X-Ways Trace Prepared By: Leen F. Arikat Supervisor: Dr. Lo’ai Tawalbeh.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 12: Managing and Implementing Backups and Disaster Recovery.
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Microsoft Visio is diagramming software for Microsoft Windows. It uses vector graphics to create diagrams. The 2007 Standard and Professional editions.
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 5: User Environment and Multiple Languages.
APPLICATION SOFTWARE DEVELOPMENT BASIS Ivanov, Vladimir Software Program Manager ITC Software.
Bar|Scan ® Asset Inventory System The leader in asset and inventory management.
TELEMEDICINE  ITC Software All rights reserved. ITC Software.
Pro Exchange SPAM Filter An Exchange 2000 based spam filtering solution.
Computer Forensics Mr.PRAWEE PROMPONMUANG M.Sc(Forensic Science) NO
ITC Software CUSTOM SOFTWARE DEVELOPMENT SERVICES Selected Projects 2005.
 ITC Software All rights reserved. ITC Software ENVIRONMENTAL ENGINEERING SOFTWARE PAK-P and PAK-C Projects Serbia and Montenegro.
With Internet Explorer 8© 2011 Pearson Education, Inc. Publishing as Prentice Hall1 Go! with Internet Explorer 8 Getting Started.
Internet Standard Grade Computing. Internet a wide area network spanning the globe. consists of many smaller networks linked together. Service a way of.
Chapter Three OPERATING SYSTEMS.
Your Interactive Guide to the Digital World Discovering Computers 2012.
ULTIMA*HIS - WEB ENABLED -  ITC Software All rights reserved. ITC Software.
ON-LINE INFORMATION SYSTEMS BUSINESS CENTRE Ruslan Vagizov, Project Manager.
FuzzyXL Fuzzy algebra add-in for MS Excel  © 2003 ITC Software.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 12: Managing and Implementing Backups and Disaster Recovery.
Objectives Overview Identify the general categories of programs and apps Describe how an operating system interacts with applications and hardware Differentiate.
 Maintains the Instrument Database  Generates the Calibration Schedules  Maintains Calibration Records  Provides Facility to enter All types of.
COMPUTER SIMULATION OF BLOOD FLOW WITH COMPLIANT WALLS  ITC Software All rights reserved.
Chapter 4 – Slide 1 Effective Communication for Colleges, 10 th ed., by Brantley & Miller, 2005© Technology and Electronic Communication.
Components of Database Management System
Business Software What is database software? p. 145 Allows you to create, access, and manage data Add, change, delete, sort, and retrieve data Next.
CMPF124 Personal Productivity with Information Technology Chapter 1 – Part 3 Introduction To Windows Operating Systems Windows Accessories Introduction.
HEALTH INFORMATION SYSTEMS (H.I.S.) Consulting Practice HISTORY OF DEVELOPMENTS: HISTORY OF DEVELOPMENTS:  ITC Software All rights.
ODT-0147 (StudiVZ) Social Networking – Best practices
BAM HEALTH NETWORK by Jan F. Brandejs PhD and Leslie D. Devlen  ITC Software / Lejanix All rights reserved.
1 UNIT 1: COMPUTER SOFTWARE Cite Examples of System Software.
© 2009 Pearson Education, Inc. Publishing as Prentice Hall 1 Chapter 1: The Database Environment Modern Database Management 9 th Edition Jeffrey A. Hoffer,
Wireless Solutions. October 16, 2015(c) Software Suite for a BT-device This Bluetooth device can be connected to a Data Projector.
Internet tool to find answers to poorly defined questions SmartNet © ITC Software,
2BrightSparks POWER WITH EASE Sync Back SyncBack SE.
Communication, Networks, The internet and the Worldwide Web.
Project 6 Advanced File and Web Searching. 2 CHAPTER OBJECTIVES  Begin a new file or folder search, save a search, and find a file using a saved search.
Configuring Data Protection Chapter 12 powered by dj.
Developing Policy and Procedure Management System إعداد برنامج سياسات وإجراءات العمل 8 Safar February 2007 HERA GENERAL HOSPITAL.
 ITC Software All rights reserved. ITC Software ENVIRONMENTAL ENGINEERING SOFTWARE PAK-P and PAK-C Projects Serbia and Montenegro.
NUMERICAL SIMULATION OF CARTILAGE DEFORMATION WITH ELECTROKINETIC COUPLING  ITC Software All rights reserved.
Enterprise Solutions Chapter 10 – Enterprise Content Management.
CMPF124 Basic Skills For Knowledge Workers Chapter 1 – Part 3 Introduction To Windows Operating Systems Windows Accessories Introduction To Windows Operating.
ENVIRONMENTAL ENGINEERING SOFTWARE Steinbeis Transfer Center for Biomedical Research Ltd. Kragujevac, the University of Kragujevac, and the Institute for.
CJ 317 – Computer Forensics
Understanding Backup and Recovery Methods Lesson 8.
Windows XP Lab 2 Organizing Your Work Competencies.
DCF*CARE COTS SOLUTION  ITC Software All rights reserved. ITC Software.
CMPF124 Personal Productivity with Information Technology Chapter 2 – Part 3 Introduction To Windows Operating Systems Windows Accessories CMPF 112 : COMPUTING.
Unit 19 Computer Music Systems 1 Examine the hardware options available for the composition and production of music using computer technology assess the.
Windows Small Business Server 2003 R2 Powering Small Businesses.
 ITC Software All rights reserved. ITC Software ENVIRONMENTAL ENGINEERING SOFTWARE PAK-P and PAK-C Projects Serbia and Montenegro.
CMPF124 Personal Productivity with Information Technology Chapter 1 – Part 3 Introduction To Windows Operating Systems Windows Accessories Introduction.
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Devices 10 billion Internet- connected devices by 2016 People 1 billion+ people use social media services today Cloud 30 % of data will live in or pass.
Network and Server Basics. Learning Objectives After viewing this presentation, you will be able to: Understand the benefits of a client/server network.
Pasewark & Pasewark 1 Windows Vista Lesson 1 Windows Vista Basics Microsoft Office 2007: Introductory.
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Unit 4 – Technology literacy
Wright State University
Application Software Chapter 6.
IWRITER 365 Offers Seamless, Easy-to-Use Solution for Using, Designing, Managing, and Sharing All Your Company Templates in Microsoft Office 365 OFFICE.
System And Application Software
Introduction To Computing BBA & MBA
How To Repair PDF File After Disk Crash???. What is PDF file..??? PDF file is portable document file. This file format is used during the exchange .
Presentation transcript:

Licitware a forensic software tool designed to investigate computer crimes

September 13, 2015(c) Licitware Licitware is a forensic software tool designed to investigate computer crimes. Based on the most advanced technologies. Unites functions of many tools and offers one of the most comprehensive instruments of analysis available today.

September 13, 2015(c) Search deleted and partly destroyed data that could not be investigated earlier. User-friendly interface makes investigation easy even for people who have no special computer skills. Licitware

September 13, 2015(c) Licitware Suspects and Players Licitware makes it easy to store data and information about people who are not suspected, but mentioned in the case. Searches for suspect’s data in case materials Allows to create links to suspects and players between different cases

September 13, 2015(c) Licitware Disk Imaging Physical stream copy of any drive to drive-clone or to file as image. Why? To reserve copy and restore data for backup purposes To investigate exact copy of the data while the original version is protected from any modification or destruction

September 13, 2015(c) Licitware Data search Search suspect’s data on hard drive (even when data was deleted, or temporarily and partly-destroyed) Investigate mailbox content, Instant messenger - and Internet Explorer history. Searches by: Keyword File type Creation, access, modification date «known files» - the Licitware database contains information about known legal and illegal software including illicit pictures. The database is constantly being updated and includes a feature to automatically check a hard drive for illegal content. View data in various file formats with Licitware without installing the software that created the files.

September 13, 2015(c) Licitware Documents and Reports This convenient tool allows you to create reports and investigation summaries. Results of an investigation can be easily grouped into separate catalogues where an expert or investigator can generate investigation summaries in a text and/or graphic format. Then: Print and/or Save in any media format These files can be used in investigations separate from the Licitware application or for presentation in court.

September 13, 2015(c) Licitware Configurations You can use Licitware in two different configurations: Stand-alone Network – at the domain structure

September 13, 2015(c) Licitware Prospects Plans are to create case materials using mobile devices that would transfer data into the system. To expand and support more operating systems. Improve analysis of the suspect’s computer hardware, parsing and analysis of the operating system logs, on order to better understand what has happened and when on the computer. Additional data de-cryption tools.

ITC Software is an advanced information technology solutions provider, focused on the global commercial and scientific markets. With over 4047 software engineers in the Americas, Europe, Russia and Asia, and a host of world-renowned scientists at, inter alia, Harvard and MIT, ITC Software’s services range from research & development in finance, bioinformatics and FEA engineering, to cutting- edge custom software development and maintenance services in most industry verticals, to the turnkey establishment of Offshore IT Centers. ITC Software has won numerous international awards and its centers are ISO 9001:2000 certified and CMMI level 4 pre-certified. Pricing is extremely competitive for both complex scientific applications such as bioinformatics and biomechanics, and commercial software development projects. We hope you enjoyed our presentation ! Please call or us, if you have any questions, need more information, would like to embark on a research project, or require software development services Tel Become a high performance enterprise with Strategic Outsourcing, visit Thank you!

September 13, (c) For more information, please visit: info(at)itcsoftware.com Phone: USA +1 (978) Fax: USA +1 (773)