• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Security Software

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Computer Forensics and Incident Response

View previous topic :: View next topic  
Author Message
nighthawk2000
Just Arrived
Just Arrived


Joined: 13 Sep 2006
Posts: 0


Offline

PostPosted: Wed Sep 13, 2006 5:01 pm    Post subject: Security Software Reply with quote

What are some good secuirty softwares tha ti can use to check local machines that has confidential stuff, like social secuirt number or credit card numbers? As an IT secuirty person, my job is to scan computers for any confidential data and remove them instead of zero writing the hard drive.

Software should also have ability to scan emails, tash cans, hidden files, hash files, or any other method that file might exist that holds the confidential information.

Thanks

Corrected spelling in title~G
Back to top
View user's profile Send private message
Groovicus
Trusted SF Member
Trusted SF Member


Joined: 19 May 2004
Posts: 9
Location: Centerville, South Dakota

Offline

PostPosted: Fri Sep 15, 2006 6:20 pm    Post subject: Reply with quote

I am sort of curious. As an IT person, wouldn't you be interested in protecting that data? I would assume that credit card numbers and social security numbers are valuable data. Why erase those?

Or are you asking how to wipe a hard drive clean of confidential data so that it can safely be reused for another purpose?
Back to top
View user's profile Send private message Visit poster's website
Ex0dus
Just Arrived
Just Arrived


Joined: 18 Nov 2005
Posts: 0
Location: Down Under

Offline

PostPosted: Sat Sep 23, 2006 10:41 am    Post subject: Reply with quote

windows desktop search.....JK

IMO you should really wipe the whole hard drive as that is the only way to insure you catch everything. searching then removing is just opening yourself to missing data.
Back to top
View user's profile Send private message
Gralfus
Just Arrived
Just Arrived


Joined: 21 Jul 2004
Posts: 0


Offline

PostPosted: Mon Sep 25, 2006 5:20 pm    Post subject: Reply with quote

Also, searching and removing would not take into account the "free space", where the information may have existed previously.

Forgive me if I sound dubious, but your request sounds either contrived or ignorant. "Software should also have ability to scan emails, tash cans, hidden files, hash files, or any other method that file might exist that holds the confidential information. " How exactly do you plan on gaining anything useful from "hash files" or encrypted files? Those would fall into the "any other method".

Your request sounds more like "Just tell me how to scan machines for the lucrative info, even if it is protected, he he." Regardless, there is no overall method to search for such information. You can try text pattern matching for existing files.
Back to top
View user's profile Send private message
susano
Just Arrived
Just Arrived


Joined: 21 Dec 2006
Posts: 0
Location: Tampa, FL

Offline

PostPosted: Fri Jan 05, 2007 5:20 pm    Post subject: Reply with quote

EnCase® Enterprise Information Assurance Suite would probably fit your needs. It has the capability to "Conduct complete classified spillage clean-up with the only tool that enables automatic, targeted search and remediation." It searches across a wide variety of formats, including mailboxes, word documents, and pdf files.
Back to top
View user's profile Send private message
charlesclemens
Just Arrived
Just Arrived


Joined: 21 Apr 2008
Posts: 0


Offline

PostPosted: Mon Apr 21, 2008 2:58 pm    Post subject: Reply with quote

Information Security Software is great place for any Security Software. Secure Bytes is an information security software development company which focuses on developing automated tools to strengthen information security management system.
Back to top
View user's profile Send private message Visit poster's website
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Computer Forensics and Incident Response All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register