Yeah, I'm still piddling around with this. The problem is I don't really know what I'm looking for with my limited computer knowledge.
I found this...Could this be used to clean/erase/modify a program to make it impossible to analyse what the original program was set to do?
FastBloc® Software Edition
FastBloc SE provides speed, reliability and versatility — as well as the convenience of being able to conduct a forensically sound acquisition or investigation without hardware devices.
IDE/SATA Support on a number of popular PCI controller cards:
Promise Ultra 133 TX2
Promise SATA 150 TX2plus
SIIG UltraATA/133 PCI
Promise Ultra100 TX2
SIIG Ultra ATA 100 PCI RAID
Safely acquire every sector on hard drives, outside the number normally presented by Windows, to overcome the issues involving Host Protected Areas (HPAs) and Device Configuration Overlays (DCOs) on IDE and SATA hard drives.
Wipe every sector of IDE hard drives, outside the number normally presented by Windows.
Restore IDE hard drives to identical-size IDE hard drives.
SCSI Support with the following:
Adaptec 29160 Controller Card
Granite Digital SCSIVue Removeable 68-pin Hot-Swap SCSI Drive Bay (P/N 5153)
Plug and Play Support:
Safely acquire IDE hard drives, using common read/write PnP adaptors.
Safely acquire USB thumb drives — especially useful for those drives lacking write protection switches.
Safely acquire USB external storage drives, without having to remove the enclosed IDE hard drive.
Safely acquire FireWire external storage drives, without having to remove the enclosed IDE hard drive.
Fastbloc SE supports HPA and DCO as well as a combination of the two. Of note, the HPA is removed temporarily so the disk is not modified at the end, but DCO and the combination of HPA and DCO permanently alters the disk.
FastBloc SE users must note that EnCase can only reach HPAs and DCOs through supported IDE and SATA channels.
Please note that FastBloc SE is designed as a write-block technology for Windows acquisitions and not a decryption technology. Thumb drives using security technologies to encrypt data may still have to be overcome before an image acquisition takes place.
http://www.guidancesoftware.com/products/ee_modules.asp#eds