
{"id":144,"date":"2007-04-10T22:02:28","date_gmt":"2007-04-11T01:02:28","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=144"},"modified":"2007-04-10T22:02:28","modified_gmt":"2007-04-11T01:02:28","slug":"herramientas-sleuth-kit-208-liberadas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/","title":{"rendered":"Herramientas Sleuth Kit 2.08 liberadas"},"content":{"rendered":"<p>Seg\u00c3\u00ban cuentan <a href=\"http:\/\/computer.forensikblog.de\/en\/2007\/04\/the_sleuth_kit_2_08.html\">en Forensic Blog<\/a>, se han liberado las herramientas Sleuth Kit 2.08<\/p>\n<p><img decoding=\"async\" alt=\"sleuth kit\" src=\"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif\" \/><\/p>\n<p>Las herramientas Sleuth Kit son una de los m\u00c3\u00a1s conocidos juegos de aplicaciones para el an\u00c3\u00a1lisis forense multiprop\u00c3\u00b3sito, y suelen ir acompa\u00c3\u00b1adas de <a href=\"http:\/\/www.sleuthkit.org\/autopsy\/\">Autopsy<\/a>, un frontal gr\u00c3\u00a1fico para no tener que lidiar con la l\u00c3\u00adnea de comandos.<\/p>\n<p>The Sleuth Kit funciona en derivados UNIX, tales como Linux, OS X, FreeBSD, OpenBSD, y Solaris, y tiene capacidad para el an\u00c3\u00a1lisis forense sobre sistemas de ficheros NTFS, FAT, Ext2, Ext3, UFS1, y UFS2, as\u00c3\u00ad como otros sistemas de vol\u00c3\u00bamenes.<\/p>\n<p>Una herramienta de sobrada calidad que no debe faltar en nuestros kits de an\u00c3\u00a1lisis. <a href=\"http:\/\/www.sleuthkit.org\/autopsy\/download.php\">Descarga ya tu copia<\/a>, es software libre<\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/wp\/\">http:\/\/www.sahw.com\/wp\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Seg\u00c3\u00ban cuentan en Forensic Blog, se han liberado las herramientas Sleuth Kit 2.08 Las herramientas Sleuth Kit son una de los m\u00c3\u00a1s conocidos juegos de aplicaciones para el an\u00c3\u00a1lisis forense multiprop\u00c3\u00b3sito, y suelen ir acompa\u00c3\u00b1adas de Autopsy, un frontal gr\u00c3\u00a1fico para no tener que lidiar con la l\u00c3\u00adnea de comandos. The Sleuth Kit funciona en [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-144","post","type-post","status-publish","format-standard","hentry","category-noticias"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Herramientas Sleuth Kit 2.08 liberadas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Herramientas Sleuth Kit 2.08 liberadas\",\"datePublished\":\"2007-04-11T01:02:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/\"},\"wordCount\":130,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif\",\"articleSection\":[\"Noticias\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Herramientas Sleuth Kit 2.08 liberadas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif\",\"datePublished\":\"2007-04-11T01:02:28+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage\",\"url\":\"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif\",\"contentUrl\":\"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Herramientas Sleuth Kit 2.08 liberadas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Herramientas Sleuth Kit 2.08 liberadas","datePublished":"2007-04-11T01:02:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/"},"wordCount":130,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage"},"thumbnailUrl":"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif","articleSection":["Noticias"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/","url":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Herramientas Sleuth Kit 2.08 liberadas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage"},"thumbnailUrl":"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif","datePublished":"2007-04-11T01:02:28+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/herramientas-sleuth-kit-208-liberadas\/#primaryimage","url":"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif","contentUrl":"http:\/\/www.sleuthkit.org\/picts\/hash-3.gif"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=144"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/144\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}