TELEPHONE:

EMAIL:


NTI-DOC

Forensic Tool

This program is used to essentially take an 'electronic snapshot' of files and subdirectories that have previously been identified as having evidentiary value. Having the program is like having a camera at the 'electronic crime scene'. It is a simple yet effective forensic documentation tool. The program automatically creates documentation that can be printed, viewed or pasted into investigative computer forensic reports. The original program titled DOC has been used for years by military and law enforcement computer specialists and was previously donated for law enforcement use by Michael R. Anderson, an NTI founder. This version contains enhancements that are not found in the original version and the program and its uses are described in Computer Forensics, Incident Response Essentials by Warren G. Kruse II and Jay G. Heiser, Cybersecurity Operations Handbook by Dr. John W. Rittinghouse and Dr. William M. Hancock and Cyber Crime Investigator's Field Guide by Bruce Middleton.

NTI-DOC - Primary Uses:

  • Used to document the contents of a logical DOS subdirectory.

  • Used to document the existence of relevant hidden, system and allocated files.

  • Used to document file attributes associated with relevant files.

NTI-DOC - Program Features and Benefits:

  • DOS based for speed. The speed of operation is in the blink of an eye.

  • No Software Dongle! - We know that software dongles get in the way and they restrict your ability to process several computers at the same time. That is why NTI does not use software dongles and our licensing of this software allows you to process multiple computers at the same time. NTI's goal is to make your life easier and this software was designed with ease of use in mind.

  • Compact program size which easily fits on a floppy diskette with other forensic software tools.

  • Output is ASCII text and is compatible with all word processors.

  • Output is automatically written to the location of the program. It assumes that the computer specialist would not run forensic software from a storage device which contains evidence.

  • Designed to be installed in the operating path and can be called from any location on the computer in a DOS session.

  • Provided free to law enforcement agencies to help with limited budgets.