En un post pasado presentamos esta herramienta, en la actualidad la misma cuenta con las siguientes características:
- Ability to generate and save a detailed log to be used by an IT expert or uploaded to an online forum for diagnosis.
- Option to exclude private, personal information from being saved in logs.
- Integrated Anti-Stealth technology allows discovering hidden objects (e.g. rootkits) in MBR, registry entries, drivers, services and processes.
- Ability to compare two existing logs for differences makes it easy to detect changes over time.
- Log entries are assigned a color code risk level for easy filtering.
- Intuitive hierarchical navigation of logs.
No hay comentarios:
Publicar un comentario