Blog

Some Use Cases and Discussion
Automated Rootkit Detection with ThreatSCOPE

This article will show how you can use the ThreatSCOPE feature of WindowsSCOPE to detect rootkits installed on a system. One of the difficulties in detecting rootkits and other advanced malware is that they’re often…

read more
WindowsSCOPE Cyber Forensics Ultimate 64-Bit Now Available

The latest addition to the WindowsSCOPE product lineup, Cyber Forensics Ultimate, is now available at the online store. This new version incorporates all the interactive features of previous versions, including system-wide disassembly and control flow…

read more
New WindowsSCOPE Product – CaptureGUARD Gateway

WindowsSCOPE now offers PCI Express and ExpressCard platforms capable of imaging physical memory and providing other cyber security related capabilities even in locked computers.  CaptureGUARD Gateway can be customized for various advanced cyber security and…

read more
New WindowsSCOPE Memory Forensics Training Videos Available

Two new tutorial videos are now publicly available on the WindowsSCOPE websiite – “Using WindowsSCOPE to Investigate 64-Bit Virtual Memory Management” and “Using WindowsSCOPE to Analyze the Shadow Walker Rootkit”. With 64-bit computers becoming increasingly…

read more
Introduction to WindowsSCOPE Live

Step 1 – Setting up your WindowsSCOPE Live Server The first step in getting WindowsSCOPE Live running is to download and install the WindowsSCOPE Live server. You can get the server on the WindowsSCOPE downloads…

read more