There is a blog post on the “Encase Forensic Blog" where Mark Morgan, a consultant for Guidance Software’s Federal Sector, describes scripts he wrote for "Using Volatility with Encase". He describes how he created these tools to help train incident response teams at federal agencies.
I have been conducting Incident Response investigation for a few years now and have always used Volatility as my tool of choice. I like it because first off it is open source and I have found it to be very user friendly in identifying possible malware and being able to understand the results that are being retrieved from memory.
I originally thought someone would have attempted to do this with Enscript but I guess a library of batch scripts and File Viewer could work if people still fear the command line. Shoutz to Mark for writing the post and shoutz to MHL for posting the “strange but true” link.