|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
31. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
32. | File Exterminator 1.0 (geocities.com) | ||
it multiple times to prevent file recovery. You can choose to shred multiple files across subdirectories or to shred a single file. Besides that, you can specify the file mask (ex : *.txt) when you want to shred files across subdirectories. The number of shreds to perform can be customised as well. File Exterminator is basically a file shredding utility that | |||
Updated: 9, 2005 | Rating: 0 | Author: Malcolm Lim | Size: 388 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
34. | File Shredder 2000 3.9 (gregorybraun.com) | ||
folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive. File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin. You can also shred files by | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 393 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
35. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | CryptoForge 3.2.5 (cryptoforge.com) | ||
This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
39. | AlmerShredder 1.05 (almersoft.com) | ||
need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of great help in your everyday work with important files. We | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
40. | AntiSpy 2.11 (softvers.com) | ||
exclude lists and filters by date.It even supports secure wipe\shred files option to make sure nobody can restore it. Plus it will save you a lot of space on your drives. After having performed a complete clearing of your PC, you can be sure than nobody will get information about the Web-sites you have visited, the documents you have opened, the messages you have sent and | |||
Updated: 9, 2005 | Rating: 34 | Author: DevelopEx _ | Size: 1231 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|