![]() ![]() Added script examples for charting via matplotlib.Added Python API reference for help file.The template can be selected under the 'New Script' button dropdown Added support for built-in script templates installed under ProgramData\PassMark\OSForensics\ScriptTemplates.Changed 'Run Python script' to 'OSF Script Player'. ![]() Scripting commands such as osf.UserActivityGetResult(), osf.ReportGenerate() & osf.LogicalImageStart() are now available Implemented new scripting engine, which allows access to internal OSF functions from Python scripting.Can load up log files from Apache, IIS and other web servers, then filter and sort the log data. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |