Below, is a brief description of PCFerret Pro’s main features.
Quick System Details
This report gives you a quick oversight of the PC’s configuration. Useful when you only need a few details and are pressed for time. This is the opening screen of PCFerret as can be seen below (figure 1).
Figure 1. Quick System Report (75% of actual size). PCFerret Pro version illustrated.
Full System Details
The Full System Details report is packed with a wealth of information relating to the host PC’s hardware and software.
It is ideal for troubleshooting and for clients to be able to provide technical support departments with accurate information relating to their system’s configuration. The report can be viewed on screen, printed for faxing, or saved as a single HTML formatted file, ready for emailing as an attachment. The image below (figure 2) is intended to give you an idea as to the format. A full report contains significantly more detail.
Figure 2. Report Format Sample (75% of actual size).
The Password Generator can produce complex passwords suitable for most applications and websites. It has many options available (figure 3) to allow the user to customize the password’s generation. Up to twenty passwords can be generated in a single click/tap; ideal for system administrators and the like.
Figure 3. Password Generator screen (75% of actual size).
Hash Generator (MD5 / SHA)
The Hash Generator is designed to calculate the Hash value of a file using user selected hash algorithms. The following algorithms are available;
MD5, SHA1, SHA256, SHA384 and SHA512.
The Hash Generator can save and print reports, and can format the generated hash values depending on the formatting options chosen by the user.
Figure 3A. The Hash Generator screen (75% of actual size).
Windows Error and Warning Event Viewer
The Windows Error and Warning Event Viewer is designed specifically to aid the IT Professional in diagnosing Windows issues, without the need to scroll through hundreds or thousands of irrelevant Event Viewer (log) entries.
PCFerret allows you to concentrate your focus on the Errors and Warnings which may appear in the specified Event logs, during a specified time frame. You can choose to view Errors, Warnings or both.
The following event logs can be selected as shown in figure 3b below: Application, Setup, Security, and System.
Features include a full description of the event, a details copy function and an automatically configured link to a specialist website which provides additional information on the relevant Event ID.
Figure 3b. Windows Error and Warning Event Viewer screen (75% of actual size).
ADS (Alternate Data Stream) Detection
Alternate Data Streams are detected and PCFerret offers a wealth of options relating to them. For a description of ADS, see our FAQ.
ADS files and their carrier file can be viewed via an integrated Hex and ASCII viewer. PCFerret can play / display media files and inform you of their type, regardless of the file’s extension.
Each ADS file can be individually analyzed, with PCFerret displaying information such as the file’s type, by analyzing the contents of the file. Warning messages are displayed to the user if PCFerret detects suspicious ADS files. An example of this can be seen in figure 4 below, where an executable ADS file has been detected and its entry is marked in red. Figure 4 illustrates how a file’s data is displayed.
There are many more options available in the ADS module. PCFerret’s comprehensive, context-sensitive help file can apprise you of these.
Figure 4. ADS Detection File Listing (75% of actual size).
The Analyze File option offers detailed information in respect to the user’s chosen file. The format is identical to the ADS file view option, so to illustrate both uses, an ADS entry has been selected for the example shown in figure 5. In this case, you can see by the heading that the ADS file has a “TXT” suffix. However, PCFerret’s analysis has determined that the file is an “MPEG” file and displayed the actual file type, a Hex and ASCII view of the file, and the image from the file. The entire MPEG video is playable so that the user can be aware of its content.
Shown in figure 5 is the More Information button. When this button is pressed/tapped, a full report of data relating to the viewed file is displayed, including any metadata.
Figure 5. Analyze File and ADS View screen (75% of actual size).
Find File By Type (Content)
The Find Files By Type tab allows you to search for files based on their content, rather than their file suffix. This allows for the detection of files which may have been renamed in order to hide data by deliberately misleading the searcher, or they could have been inadvertently renamed without their file suffix, or an incorrect suffix may have been specified.
Figure 5. Find File By Type Options Selection Screen (75% of actual size).
Reboot Operations are detected and displayed using this module. For a description of Reboot Operations, see our FAQ page.
Reboot Operations can be viewed, deleted, printed and the details can be saved to disk. You can also add your own reboot operations. When an operation is selected (figure 6), additional information relating to the relevant file or folder is displayed in the Additional File Information section. In some cases, the scroll bar can be used to reveal further information.
Figure 6. Reboot Operations (75% of actual size).
The Browser Media tab has been designed to extract images and movies from the top six most commonly used browsers’ cache. The browser names can be seen in figure 7. The movies and images are analyzed and displayed to the user.
Figure 7. The Browser Media window.
The Cached URLs tab has been designed to extract URLs from the files contained in the top six most commonly used browsers’ cache. The browser names can be seen in figure 8. The URLs can optionally be flagged by the user by utilizing PCFerret’s integrated database, containing words and phrases which can be searched for in the extracted URLs.
Detect Tor Browser
The Tor Browser is typically used by people who value their privacy and do not wish for their activities to be tracked on the Web.
The existence of the Tor Browser may, however, be an indication that someone may have something to hide. (For example, inappropriate images or data). By using this feature, you will be able to detect the presence of the Tor Browser on a PC.
To run this feature, select Tools -> Detect Tor Browser from the main menu and you will be presented with the window shown in figure 9.
Figure 9. The Detect Tor Browser window.
Additional modules and updates are constantly being developed.
PCFerret comes complete with industry standard installation technology and a fully integrated, context-sensitive help system.
PCFerret does not contain advertisements, nag screens or disabled features. PCFerret does not install so-called “bonus software” or additional software of any kind.