|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
21. | BoostXP 2.00 (systweak.com) | ||
When it comes to optimization suites and Windows tweakers, the one-stop shopping approach has emerged as the standard. Offering a number of tools to modify the Windows user interface and boost performance, BoostXP does exactly what its name implies. The neatly organized interface is loaded with standard | |||
Updated: 9, 2005 | Rating: 0 | Author: Shrishail Rana | Size: 2980 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | BPS Data Shredder 1.2.0.0 (bulletproofsoft.com) | ||
explorer, an easy to use 'drag and drop' interface, the option to shred shred files, folders, disk free space; the 'Confirm before shred' feature, a configurable overwrite pattern and number of overwrites by using sophisticated overwriting algorithms which obliterate latent data on your hard disk, making your deleted files irrecoverable, even by expensive equipment, a | |||
Updated: 9, 2005 | Rating: 0 | Author: bulletproof soft | Size: 3062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
23. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
24. | concat 4.0.0.0 (jddesign.freeserve.co.uk) | ||
ConCat/Split is a Windows Explorer context menu extension that provides two complementary facilities: 1. A split facility that lets you easily convert a single large file into several smaller ones. You can copy these smaller files onto floppy disks, or send them through email facilities that will | |||
Updated: 3, 2005 | Rating: 16 | Author: David Lowndes | Size: 245 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | CryptoForge 3.2.5 (cryptoforge.com) | ||
This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
27. | Deletor 3.1 (basta.com) | ||
Deletor helps you keep your disks clean by deleting or shredding files corresponding to file name patterns or extensions that you specify. Deletor also has support for filter packs, which allow you to store sets of your most commonly used file deletion specifications. Combine this with file date filtering and | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
28. | East-Tec File Shredder 1.0 (east-tec.com) | ||
access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | File Exterminator 1.0 (geocities.com) | ||
it multiple times to prevent file recovery. You can choose to shred multiple files across subdirectories or to shred a single file. Besides that, you can specify the file mask (ex : *.txt) when you want to shred files across subdirectories. The number of shreds to perform can be customised as well. File Exterminator is basically a file shredding utility that | |||
Updated: 9, 2005 | Rating: 0 | Author: Malcolm Lim | Size: 388 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|