|
||||||
|
||
|
Home > Secure deletion software |
Related keywords: secure, Secure, deletion, Secure Shell, secure delete, secure files, secure file, pdf secure, secure shell, secure server |
|
|
171. | East-Tec File Shredder 1.0 (east-tec.com) | ||
Deleting a file with Windows or with other programs will leave the file contents on your hard disk, easy to be recovered by anyone that has access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
172. | East-Tec FormatSecure 2005 2.0 (east-tec.com) | ||
you think that merely formatting a drive is enough to actually delete data, you may be in for a big surprise. There are plenty of free tools that can be used by anyone and that can unformat the drive and reconstruct the data. That's why when you give your co-worker or friend a file or a program on a disk (floppy, CD/DVD-RW, ZIP, Jaz, or any other type of disk), or give him access to | |||
Updated: 9, 2005 | Rating: 44 | Author: Horatiu Tanescu | Size: 1224 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
173. | EldoS PKI Tools 1.2 (eldos.org) | ||
such as pack files into ZIP archive, send files by e-mail, securely delete files and advanced security operations such as signing and encryption of files and folders. All operations are performed in a couple of clicks, e.g. you can pack files into ZIP archive, sign the archive and send it by e-mail by selecting one command in Explorer context menu. 2. Certificate | |||
Updated: 9, 2005 | Rating: 0 | Author: EldoS Corporation | Size: 3404 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
174. | Eraser 5.3 (tolvanen.com) | ||
used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
175. | EugeneShredder 1.20 (eugenesoft.com) | ||
EugeneShredder has three security levels. You can use simple file deletion (as in Windows), wipe files with single pass wiping and also use most secure NSA erasure algorithm. EugeneShredder is a file wipe utility. With EugeneShredder you can easily wipe sensitive files from your hard disk. EugeneShredder provides quick and secure file | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Konovalov | Size: 680 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
176. | Fast Cleaner 4.7 (eshinesoft.com) | ||
cleanup methods including RecycleBin,Backup Folder and Direct Deletion. 4. Engine Technology to identify garbage files and ignore important files, which ensures secure cleaning up of your harddisks and smooth running of your system. 5. Value-added functions for advanced users to perform manual disk cleanup. 6. Secure cleaning and exclude options! 7 | |||
Updated: 2, 2006 | Rating: 0 | Author: Jerry Jones | Size: 3577 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
177. | File Monster 2.6.7 (nstarsolutions.com) | ||
be recovered. The reason information is still available when you delete files with normal deletion methods is because normal deletion methods only tell the operating system to not recognize the file as being present anymore, yet the information hasn't really been erased. As a result | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
178. | File Tutelary 1.12 (siskinsoft.com) | ||
File Tutelary is a shareware to encrypt and decrypt your files by your own password quickly and securly. You can encrypt any file with a password so your documents are kept safe away from prying eyes. It also includes many features such as step by step to make it easier to use. What's FileTutelary | |||
Updated: 9, 2005 | Rating: 42 | Author: Ricky Chen | Size: 570 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
179. | FileVault 3.0 (networktoolz.com) | ||
Secure your images, movies, passwords, favourites etc. in fact any file or files. Securely delete files or directories and leave no trace. Files will be undetectable even by software forensics applications after being deleted. Use the Wizard to help you easily create Vault files | |||
Updated: 9, 2005 | Rating: 0 | Author: NetworkToolz | Size: 2610 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
180. | FineCrypt 8.1 (finecrypt.net) | ||
encryption tool with the following features: highly secure encryption with a single mouse click; secure communication with other users by email; task manager; key manager; file manager; encryption of files, folders and whole directory trees; creation of encrypted archives; creation of self-decrypting executables which can be decrypted without FineCrypt; encryption with | |||
Updated: 9, 2005 | Rating: 0 | Author: Crypto Systems | Size: 4239 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Secure deletion software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|