On Fri, 2008-12-19 at 18:43 +0000, mbm wrote:
Probably Encase since that is the most widely used forensics tool though some forces use Access Data's FTK. Another useful tool is Sleuthkit (http://www.sleuthkit.org/sleuthkit/desc.php) a free set of forensic tools which is in turn based on Venema and Farmer's earlier "Coroner's Toolkit".
Sorry when I used the term forensic recovery I was (probably using the wrong word when) referring to the methods companies such as OnTrack use. Where the platters are removed from the drive in a clean room environment and spun up on specialist hardware to read them regardless of the state of the rest of the drive mechanics/electronics.