·.·. Computer forensics software made in Germany .·.·


Certain license types that we offer may use BYOD copy protection to unlock the software. BYOD stands for "Bring your own device/disk/dongle". You select a storage device that you already own and have readily available when you order the software. That device will act as a key for one license and must be attached locally to the computer where you wish to run the software to unlock it, similar to a regular dongle



  • You can start using the software immediately, typically within minutes after placing your order online (depending on your payment method), and do not need to wait for a dongle to arrive by postal mail days or weeks later. (Courier service still takes a few days and costs extra.)

  • No risk of delays in transit, problems at customs, or loss in the postal mail system.

  • As your key device you could choose a large external USB hard disk, serving as a storage location for data that you acquire on site and a substitute for a dongle at the same time, and can contain the software itself as well, all in one, requiring only 1 free USB port. A very portable solution.

  • As your key device you could choose an internal hard disk/SSD, so that you don't need any free USB port.

  • For work in your own office, the software may be installed on several of your computers at the same time even if you only own a single license, for your convenience. While the key device is attached to a given machine, the software is executable on that machine. A USB stick can be quickly exchanged between different computers and would be very suitable in this scenario, an internal hard disk/SSD obviously not so much.

  • The same key device may also hold multiple licenses. That is useful if the software is run by multiple users at a time on the same computer, e.g. a terminal server.

  • The software does not need Internet access to authenticate the license. The key device does not need to have Internet access either. Only with your web browser (on a different computer if you prefer) you will need Internet access for a few seconds. The only data transmitted to us at that occasion is a 26-digit hexadecimal code = the ID of your key device (see below). This process usually needs to be repeated regularly (see below)!

  • Same full forensic feature set as the dongle-based version of the software. Functionality 100% identical, 100% compatibility. (But different download.)

  • Certain organizations with high security sensibilities do not need to trust/test additional hardware such as the regular USB dongles.

  • “Start & Go” (simultaneous execution of the software on multiple computers with just 1 key device) available for certain licenses types (details here).


  • Your key device becomes an object of value. Please mark it clearly and take good care of it. If you lose it or if it malfunctions, then you have a problem, you will not be able to use the software any more for a while. The risk is limited because the key device is activated only for a limited time. When you start using the storage device as a BYOD key device, we let you decide for how many months it should be activated, e.g. 1, 2 or 3 months. At the end of each such sub-period you can activate the same device again or choose a different device, but only then! You cannot choose a different device during the period for which the original device was activated!

Which devices can be used and how it works

  • Most internal hard disks/SSDs. (A RAID is not a hard disk. The simulated main storage device in a virtual machine is not a hard disk either.)

  • Most large external hard disks directly attached via USB.

  • Many current USB stick models, for example of these brands: SanDisk, Imation, Kingston, Intenso, TDK, Verbatim, Toshiba, Sony, I-O DATA, Buffalo, ADATA, PNY (models Mini-Mobile Design and Brick), Patriot Supersonic/Xporter, Transcend JetFlash (370 and 530 and probably others), HP v165w, Lexar JumpDrive, Lexar JumpDrive FireFly. The following models for example are known to be incompatible: HP v225w, Team Group S112.

The device must have at least one drive letter assigned to it. To make sure that a particular device that you have is accepted by the software for BYOD, before the purchase (to avoid unpleasant surprises!), please execute WinHex or X-Ways Forensics (for example just the evaluation version of WinHex, downloadable from here), explicitly as administrator, and hold the Ctrl key on your keyboard while clicking the version number in the upper right corner of the main window. You will be shown a list of devices that are most likely suitable that are currently attached to your system. Select your favorite and click OK. If a device ID is shown, the device is suitable! (when connected to the computer that way, very possibly not when connected in another way, for example through a different bus type or when put through to a virtual machine) If your favorite device is not listed,  or if no device is shown, then it is not suitable.

You can copy the device ID and after your purchase is confirmed need to paste it on a web page, when prompted. In return, a license file will be produced that you need to save on your key device as per the instructions (very easy). You can only choose 1 key device per license.


The license types that use BYOD are available to certain customers only. Old version of these specifications for purchases before March 2017 here.