Sneak Peek Of Belkasoft Evidence Center 2017

Belkasoft is happy to announce an upcoming release of massively updated version 8.0 of its leading digital forensic solution Belkasoft Evidence Center 2017. Version 8.0 will include a number of newly added useful features that are going to significantly improve

New! Belkasoft Evidence Center 2016

Belkasoft announces a major update to Belkasoft Evidence Center, the company’s flagship digital forensic solution, to version 2016. The new release comes with revamped user interface, numerous improvements to performance, productivity and usability. A number of new analytic functions were

Cyber Monday: Stunning Offer from Belkasoft!

Today is Cyber Monday, and if you missed Belkasoft’s Black Friday wholesale, you can still purchase our flagship digital forensic product Belkasoft Evidence Center 2015 with deep discounts! Today only, the product can be purchased for as little as $499

Is this for real?! Belkasoft Evidence Center for just $99?!

Today is Black Friday, and everything is possible. Belkasoft announces a one-time, one-day discount towards the purchase of its flagship digital forensic product Belkasoft Evidence Center 2015! Today only, the product can be purchased for as little as $99 –

BelkaScript: How to Get Most out of Digital Forensic Software

Digital investigator nowadays has access to a wide array of solid forensic tools. Some of them offer mobile forensics only, some help with computer or laptop analysis, some – like Belkasoft Evidence Center – support all types of devices, but

Advanced SQLite Analytics with Belkasoft Evidence Center (Part II)

In the first part of our series on SQLite analysis we talked about accessing corrupted SQLite files and recovering deleted SQLite records from the freelist. Today we will cover two more important topics: SQLite write-ahead log (WAL) and unallocated space

Recovering SQLite Evidence with Belkasoft Evidence Center

Much has been said about the different tools to extract, view, and recover SQLite databases. Why is SQLite analysis so important for digital forensics? Why is SQLite not straightforward to investigate? Why use Belkasoft Evidence Center for SQLite analysis? Read

Carving for Evidence: Why Choose Belkasoft Evidence Center

When looking for digital evidence, one has to look through a large number of files on the disk to discover just the few important pieces. Automating evidence search can help locate evidence stored in files that were moved, renamed or

New Belkasoft Evidence Center 7.3 Enhances Data Carving and SQLite Analytics

Belkasoft updates Belkasoft Evidence Center, the company’s flagship digital forensic solution, to version 7.3. The new release comes with significant improvements to file carving and SQLite analysis algorithms as well as the search engine. With this update, Belkasoft Evidence Center

Discover More Than 100 Mobile Artifacts with Evidence Center v.7.2

Belkasoft extends support for mobile applications in the new v.7.2 of its Belkasoft Evidence Center. In addition to more than half a thousand artifacts found inside desktop and laptop computers, which the software was able to analyze before, the new

Belkasoft Adds Forensic Support for Windows Phone 8.1

Belkasoft updates its digital forensic solution, Belkasoft Evidence Center 2015, with the ability to perform forensic analysis of Windows Phone 8.1 images acquired via JTAG flashers and Cellebrite UFED hardware. The new release enables automated extraction, discovery and analysis of

Belkasoft Evidence Center 5.3: New Tool to Share Collected Evidence

Belkasoft announces a major update to its flagship forensic product, Belkasoft Evidence Center 2013. Version 5.3 introduces Evidence Reader, an all-new free tool allowing Belkasoft users to pass along evidence collected with the main product. Over 12 other enhancements are

Belkasoft Releases Free Kernel-Mode Live RAM Capturing Tool

Belkasoft has released a new kernel-mode forensic tool to capture the content of the computer’s volatile memory. Belkasoft RAM Capturer offers forensic specialists the ability to take snapshots of the computer’s volatile memory (“memory dumps”) even if an anti-dumping protection