|
||||||
|
||
|
Home > Secure delete software |
Related keywords: secure, delete, Secure, delete history, Delete, delete files, Secure Shell, secure files, secure deletion, secure file |
|
|
151. | Chameleon 2.0 (members.optushome.com.au) | ||
is a secure file encryption application that hides your files from anyone that monitors your emails, personal files even hard disk. More and more SPY software is being used; You need to be sure that files containing sensitive information are kept safe. There is no Electronic Privacy, especially on the Internet. Any want can now with little knowledge of hacking can easily | |||
Updated: 9, 2005 | Rating: 0 | Author: Chris Dimopoulos | Size: 1437 kb | Adware Go to category: System Utilities > Other Similar programs | |||
152. | Chat Little Black Address Book 1.1 (hirtlesoftware.com) | ||
open and ready whenever you go online. Add new chat partners, delete old chat partners or modify existing chat partners in an instant. Best of all, your database is password protected. There is no limit to the amount of chat partners you may create or edit. Every chat partner can be accessed in micro-seconds using alphabet index buttons or by a powerful built-in search engine | |||
Updated: 9, 2005 | Rating: 0 | Author: Tim Hirtle | Size: 5147 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
153. | Cipherlok 2.1 (softlok.com) | ||
is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be automatically encrypted at shutdown and decrypted at startup ensuring security when, for | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
154. | Clean Disk Security 7.54 (diskcleaners.com) | ||
program gives you secure file deletion, making sure that deleted files cannot be undeleted again. Deleting a file normally just removes the file's directory entry, but the data itself remains on the disk. This program completely eliminates the contents of deleted files. The highly acclaimed Gutmann disk cleaning method is now available as an option. This | |||
Updated: 3, 2006 | Rating: 16 | Author: Kevin Solway | Size: 660 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
155. | Cleaner 1.1 (softcomplete.com) | ||
is known, that after deleting files in Windows, they can be restored, since the information on the disk is not deleted, and is marked as free blocks. Cleaner securely deletes file data, located in free disk space. After that the restoring of the information becomes impossible. It is known, that after deleting files in Windows, they can be restored. Cleaner | |||
Updated: 9, 2005 | Rating: 0 | Size: 153 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
156. | Clear Your Footprints 1.4 (newpowersoft.com) | ||
automatically The main features of Clear Your Footprints are: Delete the file securely and make it nonrecoverable. Delete the directory securely and make it nonrecoverable Browse and edit your typed URL history. Browse and edit IE History. Clear Internet temporary files,IE History,IE Favorites,cookies,Location bar addresses, password history,AutoComplete | |||
Updated: 3, 2005 | Rating: 16 | Author: Yong Li | Size: 1100 kb | Shareware Go to category: Network & Internet > Other Similar programs | |||
157. | Cloak 8.0 (insight-concepts.com) | ||
completely blank to the naked eye, and also shred & permanently delete files from your system. In addition to protecting documents and e-mails, Cloak also provides industry standard internet trace cleaning options. Permanently erase cookies, temporary internet documents, internet history files, recently typed URLs, and much more. Cloak can also be fully integrated with Microsoft | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
158. | Complete Cleanup 4.83 (softdd.com) | ||
files, and various registry entries, along with the ability for secure file wiping, so the cleaned files cannot be recovered at a later time. Cleanups can be run automatically in the background, and a built-in cache viewer is also provided. You can even choose to keep or view individual cookies, and you can enter any of your own personal cleanups which you would like to add to the | |||
Updated: 2, 2006 | Rating: 42 | Author: SoftDD Software | Size: 893 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
159. | Cresotech DesktopSafe Lite 1.12 (cresotech.com) | ||
confidential information. It provides the comfortable management and secure storage of passwords, nicknames, credit card, bank account and document data as well as other confidential information. Cresotech DesktopSafe protects your confidential information from being viewed. Instead of memorizing | |||
Updated: 8, 2004 | Rating: 0 | Author: Cresotech, Inc. | Size: 3192 kb | Freeware Go to category: System Utilities > Other Similar programs | |||
160. | Data Destroyer 1.5 (braintwist-studios.com) | ||
all of which constitutes an electronic data trail, should be securely deleted so to avoid corporate or personal information leakage. But deleting files with Windows merely removes the file system's pointer to the file, all the data remains on your hard drive or floppy disk. The remaining data can be easily recovered with data recovery or forensic software. Your | |||
Updated: 8, 2004 | Rating: 42 | Author: Jens Huebner | Size: 1367 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Secure delete software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|