We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What Are the Different Computer Forensics Tools?

By G. Wiesen
Updated Jan 27, 2024
Our promise to you
WiseGEEK is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At WiseGEEK, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

There are a number of different computer forensics tools available from various software developers, though most of them are designed as individual applications or larger toolkits. Many of these programs are designed to allow forensic specialists to view and save information from one storage device to another, including disk imagers that create an “image” of a hard drive. There are also programs that can be used to recover data that was deleted from a drive or view metadata on a media format or file. While many of these computer forensics tools are available individually, some toolkits have also been created that combine multiple utilities in a single application.

One of the most popular and useful computer forensics tools is a program often referred to as a disk imager. This program can be used to create an “image” of a disk, including portable media devices and hard disk drives. The image is actually a copy of all of the information stored on the disk, which allows a computer forensic analyst to create a copy of a drive for further research. These computer forensics tools are essential in criminal investigations, allowing work to be done on a copy of a drive without risking the original drive and the data found on it.

There are also numerous computer forensics tools developed to provide analysts with utilities to recover and view various types of data. These programs can include partition managers and viewers, which allow forensic workers to view files or partitions that may be hidden on a computer, as well as software that can be used to recover files that were deleted from a computer. Deleted files often leave behind pieces of data that can be used to potentially re-create the original file or to at least view part of the file.

Computer forensics tools can also be developed to help users find and analyze metadata on a disk or associated with a file. This type of data can be used to determine where a disk was used on a computer or to find when a file may have been altered or accessed in the past. These computer forensics tools are often provided by software companies as individual utilities, though they may also be available in a bundle or toolkit. Such programs and toolkits can be quite expensive, since they are often developed for law enforcement or corporate use, and the toolkits may actually provide these utilities at a lower overall price for use by forensic professionals.

WiseGEEK is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.

Discussion Comments

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.

WiseGEEK, in your inbox

Our latest articles, guides, and more, delivered daily.