Editing HashKeeper
Jump to navigation
Jump to search
Warning: You are not logged in. Your IP address will be publicly visible if you make any edits. If you log in or create an account, your edits will be attributed to your username, along with other benefits.
The edit can be undone. Please check the comparison below to verify that this is what you want to do, and then save the changes below to finish undoing the edit.
Latest revision | Your text | ||
Line 1: | Line 1: | ||
− | {{ | + | {{Infobox_tool |
− | |purpose=Digital Evidence Laboratory specialists created the HashKeeper software in 1998 to expedite the analysis of electronic media by reducing the number of files to be analyzed during the course of an investigation. | + | |purpose= Digital Evidence Laboratory specialists created the HashKeeper software in 1998 to expedite the analysis of electronic media by reducing the number of files to be analyzed during the course of an investigation. |
− | |homepage=http://www.usdoj.gov/ndic/domex/hashkeeper.htm | + | |image= |
− | | | + | |homepage= http://www.usdoj.gov/ndic/domex/hashkeeper.htm |
− | + | |license= | |
− | + | |platforms= | |
− | | | ||
}} | }} | ||
+ | |||
+ | <!-- Delete the Categories that do not apply --> | ||
+ | [[Category:Forensic]] | ||
+ | |||
+ | |||
= Description = | = Description = | ||
Digital Evidence Laboratory specialists created the HashKeeper software in 1998 to expedite the analysis of electronic media by reducing the number of files to be analyzed during the course of an investigation. HashKeeper works by storing MD5 hash values, or "digital fingerprints", of common software applications and compares those hash values against the files encountered in a seized system. | Digital Evidence Laboratory specialists created the HashKeeper software in 1998 to expedite the analysis of electronic media by reducing the number of files to be analyzed during the course of an investigation. HashKeeper works by storing MD5 hash values, or "digital fingerprints", of common software applications and compares those hash values against the files encountered in a seized system. |