·çÁ¨¼ÒÇÁÆ®    ÈÞÆó¾÷Á¶È¸    SMS    ÀÚ·á½Ç    VPN   
GLOBAL_MENU
·çÁ¨¼ÒÇÁÆ®
  
  
·çÁ¨¼ÒÇÁÆ® SMS¼¾ÅÍ
¾÷°è ÃÖÀú°¡°Ý ´Ü¹® 9.9¿ø Àå¹® 26¿ø!
´ë·® ¹ß¼Û½Ã °¡°ÝÇùÀÇ °¡´É! Áö±Ý ½ÅûÇϼ¼¿ä
°ÔÀÓ
¸ÖƼ¹Ìµð¾î
À¯Æ¿¸®Æ¼
µ¥½ºÅ©Å¾
ÀÎÅͳÝ
³×Æ®¿öÅ©/¼­¹ö
µå¶óÀ̹ö
¾÷¹«/±³À°
Ŭ¸³¾ÆÆ®/±âŸ
¿¡¹Ä°ÔÀÓ
·çÁ¨¼ÒÇÁÆ® ·çÁ¨VPN
±¹Á¦Ç¥ÁØ PPTP¹æ½Ä Áؼö
KT,LG µà¾ó¹éº»À¸·Î ¾ÈÁ¤¼ºÈ®º¸, 1GB ¼Óµµ
À¯Æ¿¸®Æ¼ > ¹®¼­ ÆíÁý±â/¸®´õ
WinHex 15.1
ÆòÁ¡ 10.0 ¶óÀ̼¾½º ¼Î¾î¿þ¾î
»ç¿ëÀÚÆòÁ¡   ¿î¿µÃ¼Á¦ 98/Me/NT/2000/XP
´Ù¿î·Îµå 0 ÆÄÀÏÅ©±â 1.4 MB
Á¦ÀÛ»ç X-Ways Software Technology AG µî·ÏÀÏ 2018-07-13 10:31:32
- ÇÁ·Î±×·¥ ¼³¸í

ÇÁ·Î±×·¥¸í¿¡¼­ ¾Ë ¼ö ÀÖµíÀÌ ±âº»ÀûÀÎ ÇÁ·Î±×·¥ÀÇ ±â´ÉÀº Hex ¿¡µðÆà ¹× °¢Á¾ ¹®¼­ ¿¡µðÅͷμ­ÀÇ ±â´ÉÀÔ´Ï´Ù. ANSI ASCII, IBM ASCII, EBCDICÇü½ÄÀÇ ¹®ÀÚÇü½ÄÀ» ¸ðµÎ Áö¿øÇÏ°í binary, hex ASCII, Intel Hex, Motorola SÇüÅ·ΠÀÚÀ¯·Ó°Ô ÀüȯÀÌ °¡´ÉÇÕ´Ï´Ù. ¶ÇÇÑ 4GBÀÌ»óÀÇ °Å´ëÇÑ ¹®¼­µµ Áö¿øÇÏ¸ç ºü¸¥ ¿­±â¿Í ÆíÁýÀÌ °¡´ÉÇÕ´Ï´Ù.

WinHex°¡ ¿©Å¸ ´Ù¸¥ ¹®¼­ ¿¡µðÅÍ ÇÁ·Î±×·¥°ú Â÷º°È­ µÉ ¼ö ÀÖ´Â °ÍÀº ¸Å¿ì ´Ù¾çÇÑ µð½ºÅ© ¹× ¸Þ¸ð¸® °ü·Ã ±â´ÉÀ» Á¦°øÇÏ°í Àֱ⠶§¹®ÀÔ´Ï´Ù.

WinHex´Â °¢Á¾ HDD ¹× ±¤Çеå¶óÀ̺ê, Zipµå¶óÀÌºê ¹× CF¸Þ¸ð¸® µî °¢Á¾ ÀúÀå¸Åü¸¦ °¡¸®Áö ¾Ê°í FAT(16/32), NTFS, Ext2/3, ReiserFS, CDFS, UDFµî ´Ù¾çÇÑ ÆÄÀϽýºÅÛ»ó¿¡¼­ ÆÄÀÏ ¹× µð·ºÅ丮 ±¸Á¶¸¦ º¼ ¼ö ÀÖ´Â ºê¶ó¿ìÀú ±â´ÉÀ» Á¦°øÇϸç, ÇØ´ç µð½ºÅ©»óÀÇ ÆÄÀϵéÀÇ ³»¿ëÀ» º¯°æÇÏ°í À̸§À» ¼öÁ¤Çϰųª ÆÄÀÏ°£ º´ÇÕ ¹× µð¹ÙÀ̵ù, ÆÄÀÏ°Ë»ö ¹× ġȯµîÀÇ µð½ºÅ© ÆíÁý±â´ÉÀ» Á¦°øÇÕ´Ï´Ù.

¶ÇÇÑ µð½ºÅ©¸¦ Åë°·Î º¹Á¦(cloning)Çϰųª À̹ÌÁö ÆÄÀÏÀ» »ý¼º/º¹±¸ ÇÒ ¼ö ÀÖ´Â ±â´ÉÀ» Á¦°øÇϸç Áö¿öÁø ÆÄÀÏÀ» º¹±¸Çϰųª ÈçÀû¾øÀÌ ¿ÏÀüÈ÷ Áö¿ì´Â ±â´É(wiping)°ú °°Àº °­·ÂÇÑ µð½ºÅ© °ü·Ã ±â´ÉÀ» Á¦°øÇÕ´Ï´Ù.

WinHex´Â ÇöÀç ¸Þ¸ð¸®¿¡ »óÁֵǾî ÀÖ´Â ÇÁ·Î¼¼½º¸¦ ¿­¾îº¸°í ÆíÁý(¼Î¾î¿þ¾î¿¡¼­´Â ±â´ÉÁ¦ÇÑ)ÇÒ ¼ö ÀÖ´Â ±â´Éµµ Á¦°øÇÏ°í ÀÖ½À´Ï´Ù.

µû¶ó¼­ WinHex´Â ÀϹÝÀûÀÎ Hex¿¡µðÆà ¹× ½ºÅ©¸³Æ® ÀÛ¼º°ú °°Àº ¿ëµµ ÀÌ¿Ü¿¡µµ µð½ºÅ©ÀÇ µ¥ÀÌÅ͸¦ º¸´Ù °­·ÂÇÏ°Ô ÆíÁýÇÏ°í °ü¸®ÇÏ°íÀÚ ÇÏ´Â »ç¿ëÀÚ¿¡°Ô ÀûÇÕÇÑ ÇÁ·Î±×·¥À¸·Î ÃßõÇÏ°í ½Í½À´Ï´Ù.

ÀÌ ÇÁ·Î±×·¥Àº ¿µ¹®ÆÇÀ¸·Î¼­ ÇѱÛÁ¦¸ñÀÇ ÆÄÀÏÀ̳ª Æú´õÀÇ °æ¿ì Á¤»óÀûÀ¸·Î Ç¥±âµÇÁö ¾Ê´Â ¹®Á¦°¡ ÀÖ½À´Ï´Ù.


°³¼±»çÇ×


  • Ability to detect simple attempts at masking any files of any type as executable files. Such files will not be confirmed as executable files any more. Forensic license only
  • Allows to better focus on unusual executable files by assigning them to report tables when they contain unknown segments or an unexpected tail. Forensic license only
  • Can better distinguish between various .exe file types including legacy formats, DLLs, fonts, VXDs, and other drivers (see Type column after file type verification). Forensic license only
  • Special support for executable files when running the file header signature search. The file size and the precise file type will be detected. The exact file size helps to exclude known irrelevant files with the help of hash databases
  • Size detection for very large zip archives during file header signature search. Size detection for 7zip file newly introduced
  • It is now possible to automatically associate the parent file and child objects of a selected file with a report table as well
  • Files that are child objects of a file (i.e. whose parent is not a directory) are now specially marked in the directory browser with 3 light blue dots in the upper left corner of the icon
  • It is now much more convenient to supply lengthy filename lists for use as a filename filter. Multiple filenames or filename masks are no longer concatenated with semicolons, but entered (or pasted from the clipboard!) one per line
  • When extracting thumbnails from JPEGs, they are now listed as child objects of the respective JPEG file. Such thumbnails and other generically named embedded pictures are now considered virtual files. Forensic license only
  • Attached external files will now always be added as child objects of the selected object, even if you add a single file only, unless you hold the Shift key. It is now also possible to attach external files to a directory. Forensic license only
  • Ability to add a selected block as a virtual file (Edit menu) now in File mode, too. In that case it will be added as a child object of the original file. Forensic license only
  • Support for viewing the NTFS system file $UsnJrnl, another unique feature. Forensic license only
  • Examination of $LogFile as part of thorough file system data structure search on NTFS volumes even more complete now. Forensic license only
  • The Interpretation of $LogFile for View command/Preview mode now more complete. It also now shows you the date range coverered (see bottom of Preview/View), so that you can easily determine whether relevant dates are covered by $LogFile at all
  • Ability to deal with FAT32 volumes whose main boot sector is corrupt if the backup boot sector is intact. Ability to automatically find lost FAT32 partitions when scanning for lost partitions even if the main boot sector is corrupt  
    ÀÌ ÇÁ·Î±×·¥Àº ±â´ÉÁ¦ÇÑÀÌ ÀÖ´Â ¼Î¾î¿þ¾îÀÔ´Ï´Ù.
  • - ½ºÅ©¸°¼¦