Detective Bit Bytes' Toolbox - The Time Machine is a comprehensive 5 in 1 toolset against unwanted content and a limitless multi-purpose monitoring tool for creative users.
Усі рецензії:
Немає користувацьких рецензій
Дата виходу:
28 квіт. 2022
Розробник:
Видавець:
Позначки

Увійдіть до акаунта, щоби додати цей продукт до списку бажаного чи позначити як ігнорований.

українська мова недоступна

Цей продукт не підтримує вашу мову. Будь ласка, перегляньте список підтримуваних мов перед купівлею.

Увага: Застосунок Detective Bit Bytes' Toolbox - The Time Machine більше не доступний у крамниці Steam.
 

Про цю програму

Detective Bit Bytes' Toolbox - The Time Machine is a comprehensive 5 in 1 toolset against unwanted content. It helps you to find resource-wasting content that might impact your gaming experience. Also, it is possible to find malicious software and see what is happening. It is so easy to use and everyone can use it.

The application is optimized very well and you can log a whole SSD partition including 700.000 files in only 30 seconds. It can also compare the two partition logs in 10 seconds. (Note: Results may differ according to your hardware. You may get faster or slower results on your PC)

You don't always have to run it. After getting your first log, you can uninstall and forget it for months. After a month or two, you can look at what happened to your computer. It depends on your choices. You can monitor, analyze, and track the whole system whenever you want.

It helps you to find

  • System resource, network bandwidth consumers to optimize your PC
  • Unknown behaviors of a software
  • Garbage abandoned data
  • Huge files/folders that take your space
  • Every kind of suspicious, harmful software that might be unknown for antivirus, antispyware applications
  • Added, deleted, modified content for tracking

and more...

You can easily monitor every kind of application's file, registry, and network operations by using this tool. It generates very simple results. So, you don't have to deal with verbose data. It compares past and present and finds what is different.

It includes File System Monitor, Registry Monitor, Service Monitor, Process Monitor, and Network Monitor.

There are Manual and Automatic modes in the application. You can get your logs manually or automatically. If you start an automatic task, the application will start when Windows starts and it will get logs automatically. If you stop the automatic task, the application will not start when Windows starts. You can choose the time period of automatic logging.

Questions & Answers

Is this an antivirus software?

No. It is a multi-purpose toolkit for monitoring system. Antivirus software only detects harmful software. Some legit software may use your system resources, badly as well and this may impact your gaming performance. Useless files may take your free space. Useless processes may use your CPU, RAM, and network connection. Detective Bit Bytes' Toolbox - The Time Machine can be used for multi-purposes (Finding useless software/files, analyzing malware, or discovering something new just for curiosity, etc.)

What is the difference between this software and the similar tools?

Detective Bit Bytes' Toolbox - The Time Machine is a unique tool that does not give you verbose data. It is so easy, completely safe to use and it does not require technical knowledge and skills. It is also optimized for getting and comparing logs very fast. Other similar software gives you thousands of lines of verbose data and you get lost and find nothing. If you find what you are looking at first, getting details is not an issue. There are a lot of applications to do this.

Also, Detective Bit Bytes' Toolbox - The Time Machine can monitor the whole system. Some applications hide their behaviors if you monitor them specifically. They cannot detect and escape from this tool if they don't especially target Detective Bit Bytes' Toolbox - The Time Machine.

Is Detective Bit Bytes' Toolbox - The Time Machine a live monitoring application?

No. It is logging your file system, registry, etc., then compares them, and shows you the differences. You can close the application after getting log. You don't always have to run it.

Can Detective Bit Bytes' Toolbox - The Time Machine prevent malicious software?

No. It is a monitoring software and it can only read.

Does Detective Bit Bytes' Toolbox - The Time Machine show only harmful or useless content?

No. It shows everything. You can even see what Windows Operating System is doing. If you find something suspicious, do not delete or modify anything before doing an investigation. It is dangerous. You can damage your system. The application never delete or modify these files. It only reads.

Can Detective Bit Bytes' Toolbox - The Time Machine help for finding rootkit?

It depends on the conditions. Rootkits require some level of interaction with your operating system to accomplish their objectives. They come with a driver file that you might see. Also rootkits are old threats. Microsoft is using driver signing procedures for a long time and the operating system does not load them if they are not signed. Modern operating systems also use hardware abstraction layers. New systems are leaving legacy BIOS mode and using UEFI. It is very hard to find a working rookit today.

Where are the foreign IP addresses and ports on the Network monitor page?

Right click on the table and click the "Show IP Addresses" button. But this is out of the scope of this software. The software finds the most static information possible and compares them. Dozens of foreign IP addresses and temporary foreign ports are used just in a day. But there are not so many processes that use your internet. If you find a newly installed software that uses your network, you may discover a spyware, adware, etc. Detective Bit Bytes' Toolbox - The Time Machine brings you enough information to find a network using process.

I got an error. What can I do?

Please check if there is a file named "detective_bit_bytes_service_log.txt" or "detective_bit_bytes_log.txt" in the installation folder. If you find one of them, send it to the support address or the community room.

Do the log files keep the content of files?

No. they just keep metadata for comparison. Their disk size usage is also quite low because of this reason. Logging a whole partition that has 700.000 files takes only 10 megabytes.

Can I move my log files?

Yes. You can find the "LogData" folder in the installation folder. But the log files' hashes must be the same to compare. Hash is generated from monitored and excluded paths. If you monitored different paths, you can't compare them. You can use these file creatively. You can get a log from a clean Windows installed computer and compare with the other PCs, etc.

Can I use Steam Cloud?

No. Steam Cloud is disabled by the developer for the customer's security. Everything is kept locally (on your system). The software does not use the internet to connect to somewhere, does not collect any kind of data to share. You can use it in Steam offline mode. After getting your log file you can even uninstall the software and install it again whenever you want.


But, depending on your preference, you can manually upload your data to your favorite cloud storage by copying the log folder. You can also add extra protection by using encrypted zip file, etc. It is your decision. Log files are already encrypted but you can add more security.

What is the status of my license?

It is a lifetime license. You can keep it forever in your Steam account. Only one person (the Steam account owner) is allowed to use the software.

How can I search the text results?

The tool gives you organized result data in a treeview. Searching a treeview is a time-consuming task and it is not a suitable component for this job. You can export data and use your favorite text editor for searching. There could be numerous user requirements related to the search functionality. Some users prefer regex, the other ones want simpler search functions. This tool is designed for everyone. Simplicity is the first aim of this product.

How can I use this product for malware analysis? It requires Steam.

The product is integrated to Steam for licensing. You can use a virtual machine and you can use Steam in offline mode.


If you use this product for commercial purposes, you can create an account for the software and use two step verification. If you take virtual machine snapshots, your task will be easier.

Will you add new features?

This is a complete product. New features may come. But this product's aim is being simple. Also, the product is optimized very well for fast searching. Its price is determined according to its features.

Системні вимоги

    Мінімальні:
    • Потребує 64-бітних процесора та операційної системи
    • ОС *: Windows 8+
    • Місце на диску: 500 MB доступного місця
    • Додаткові примітки: Requires .NET Desktop Runtime 6+
    Рекомендовані:
    • Потребує 64-бітних процесора та операційної системи
* З 1 січня 2024 року клієнт Steam буде підтримувати лише Windows 10 чи новіші версії цієї ОС.
Немає жодної рецензії на цей продукт

Ви можете написати вашу власну рецензію на цей продукт, щоб поділитися вашим досвідом зі спільнотою. Скористуйтеся полем над кнопками придбання на цій сторінці, щоб написати вашу рецензію.