zinela.blogg.se

Nirlauncher
Nirlauncher













nirlauncher

In order to decrypt the data stored inside Credentials file on external drive, you have to know the login password of the user.

  • Password of MSN Messenger / Windows Messenger accounts.
  • Internet Explorer 7.x and 8.x: passwords of password-protected Web sites ("Basic Authentication" or "Digest Access Authentication").
  • Remote Desktop 6 user\password information.
  • Passwords of mail accounts on exchange server (stored by Microsoft Outlook).
  • Login passwords of remote computers on your LAN.
  • Windows operating system stores the following information inside Credentials files: The 'Load history from the specified custom folders' option or the 'Load history from the specified history files' option (In the 'Advanced Options' window).ĬredentialsFileView decrypts and displays the passwords and other data stored inside Credentials files of Windows. In order to extract the browsing history from external drive, you should use the 'Load history from the specified profiles folder' option or the 'Load history from the specified profile' option or

    nirlauncher

    More will be added soon.īrowsingHistoryView extracts browsing history information from all major Web browsers, including Firefox, Chrome, Opera, Internet Explorer, Microsoft Edge. This Forensic utilities list is still under construction. Improved usability to easily extract data from external disks. It's possible that I'll provide an option to purchase a forensic license for my software with more support and If there will be enough demand from forensics examiners/companies, To extract data and information from external hard-drive, and with a smallĮxplanation about how to use them with external drive.īe aware that these tools were released as freeware, and thus my ability to supportįorensic examiners is very limited.

    nirlauncher

    In the following section, you can find a list of NirSoft utilities which have the ability















    Nirlauncher