Imaging Serial Attached SCSI (SAS) hard drives has presented a challenge to forensic examiners, until now. The T6es Forensic SAS Bridge is the first (and only) portable hardware write blocker available for SAS hard drives today.
About Black Hole Faraday Bags Our line of Black Hole Faraday Bags have been designed to aid law enforcement, military, and consultants in the collection, preservation, transport, and analysis of wireless evidence. Wireless devices such as cell phones, GPS, netbooks ,bluetooth devices, laptops, etc. are shielded from cellular, WiFi, bluetooth and radio signals by EDEC's proprietary ISOTech Shielding System when inside of our faraday bags. The ISOTech Shielding System is lightweight and durable for use in the field and the lab. – Faraday bags are generally used for evidence seizure. Our bags allow for light analysis, such as evidence preview. – Faraday bags can also be used for personal data security, allowing you to keep devices on while network signals are blocked – Faraday bags provide effective electromagnetic shielding and communications control for a wide range of wireless transmission and reception devices, such as cell phones (GSM, CDMA, 3G), PDA's, two-way radios, and blue tooth devices. – ISOTech shielding system ensures effective signal blockage and long product life Standard Black Hole Faraday Bag The original Black Hole Faraday Bag for securing mobile device evidence such as cell phones, GPS units, and bluetooth devices from connecting with wireless networks. – Effective electromagnetic shielding – Wear-resistant outer canvas shell – Incorporated note slot for easy record keeping External dimensions: 8.2" tall x 7.8" wide Shielding Specifications: 900MHz: 44 dB 1.8 Ghz: 46 dB 2.1 GHz: 44 dB 2.4 GHz: 50 dB Each Bag Includes: Outer plastic bag to maintain faraday material quality and freshness 10 evidence cards (Additional Evidence Bags can be purchased separately)
Dualcomm's patent pending 10/100/1000Base-T gigabit network TAP (DCGS-2005L) is a portable hardware device for capturing bi-directional inline traffic of an Ethernet link segment. It is usually used for network intrusion detection systems, VoIP recording, network probes for monitoring and trouble-shooting, and etc. DCGS-2005L implements PoE inline power pass-through between two inline ports, which allows DCGS-2005L to be placed inline between a PoE switch and PoE powered device such as an IP phone or access point without blocking the POE inline power from the PoE switch to reach the PoE powered device. DCGS-2005L is also designed to be conveniently powered by a USB port so that an otherwise heavy and bulky AC/DC power adapter becomes not necessary! DCGS-2005L can also function as a 5-port Gigabit Ethernet Switch.
Secure your laptop quickly and easily. Protect your laptop and personal information with the Kensington Combination Ultra Laptop Lock. The push button design offers one hand operation for easy installation while the Kensington T-bar secures the lock to your laptop. A keyless 4-wheel combination is easily resettable and offers 10,000 possible combinations. Simply anchor the lock to a desk, table or fixed structure and you are Ultra secured. Cable: 6 ft. long, 4.0/6.0mm dia. thick, carbon strengthened.
USB KeyLogger 8MB Black — Small, fast, and smart — One of the world's smallest and smartest USB hardware keylogger. This keystroke recorder has 8 Megabytes of memory capacity equal to more than 8,000,000 keystrokes and over 4,000 pages of text. Super fast data retrieve is achieved by switching into Flash Drive mode for download. Completely transparent for computer operation, no software or drivers required. Supports national keyboard layouts. — Installation of the hardware USB keylogger in record mode is quick and easy. Simply plug it in between the USB keyboard and the USB port. No software or drivers are required. The USB keylogger will automatically start recording all data typed on the keyboard to the internal flash disk. Disconnect the USB keyboard from the USB port at the computer or hub. This can be done even with the computer up and running. Connect the hardware USB keylogger between the USB keyboard and the USB port. Keystroke logging will start automatically. Once data has been captured in record mode, you can retrieve it on any computer with a USB port. This is done by switching to Flash Drive mode. ___________ Applications: – Observe WWW, E-mail & chat usage by children and employees – Monitor employee productivity – Protect your child from on-line hazards and predators – Save a copy of typed text – Monitor your own computer on suspicion of unauthorized use by others. ____________________________________ Generally it's permitted to monitor your own computer, meaning you can watch what your kids and family are doing on the computer. It is obviously NOT LEGAL to use this device for any type spying, or stealing confidential data.