Protect your business with AI policies and data loss prevention in the browser
Make AI work your way with Chrome Enterprise. Block unapproved sites and set custom data controls that align with your company's policies.
Download Chrome
Simple, Secure Domain Registration
Get your domain at wholesale price. Cloudflare offers simple, secure registration with no markups, plus free DNS, CDN, and SSL integration.
Register or renew your domain and pay only what we pay. No markups, hidden fees, or surprise add-ons. Choose from over 400 TLDs (.com, .ai, .dev). Every domain is integrated with Cloudflare's industry-leading DNS, CDN, and free SSL to make your site faster and more secure. Simple, secure, at-cost domain registration.
XML carver which can carve damaged or non-standard XML out of any file. It rebuilds the XML tree, along with giving the offsets for all the carved XML data. This tool was developed for the DFRWS 2010 Forensics Challenge.
Tool/s to automate the gathering of metadata from evidence artefacts collected during forensic examination and visualise the relationships between actors => objects using existing Knowledge Discovery and Social Network Analysis techniques
Outdated! Only works for Firefox 3.0-3.2. ff3hr is a forensic tool to recover deleted history records from Firefox 3. FF3 uses various SQLite databases to store the history, and this tool can recover records from different tables in an disk image.
Forensic tool designed to extract 3GP video files (regular files, deleted or fragments), SMS (regular, erased or fragments) and address books (regular, erased or fragments) from memory dumps of motorola V3i, V3r and V3D&G cell phones.
Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.
Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.