|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
31. | File Exterminator 1.0 (geocities.com) | ||
it multiple times to prevent file recovery. You can choose to shred multiple files across subdirectories or to shred a single file. Besides that, you can specify the file mask (ex : *.txt) when you want to shred files across subdirectories. The number of shreds to perform can be customised as well. File Exterminator is basically a file shredding utility that | |||
Updated: 9, 2005 | Rating: 0 | Author: Malcolm Lim | Size: 388 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
32. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | File Shredder 2000 3.9 (gregorybraun.com) | ||
folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive. File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin. You can also shred files by | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 393 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
34. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Additional Options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer. Works on Windows 2003/XP/2000/NT/Me/98 and all kinds of disk types like FAT16, FAT32, NTFS. Folder Lock | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | IECleaner 1.1 (zipstore.com) | ||
cleaning. You can also clean up all recent documents, defined folder(s), the Windows temporary folder and Windows clipboard automatically. A clean up function is available to eliminate all temporary files on your disk(s). IECleaner also provides an advanced function for file deletion | |||
Updated: 9, 2005 | Rating: 39 | Author: Atypie Software | Size: 1190 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
36. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
37. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
a folder as text, change attributes of multiple files and securely shred files. Multi-ZIP-licity is a program for processing multiple ZIP files. It extracts files from multiple archives and creates multiple archives. Extra tools allow to encrypt and decrypt files, list folders as text, change attributes and shred | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
38. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
39. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
can be decrypted without installing PlexCrypt. PlexCrypt can also shred or deletes documents securely. It supports MD5WithRSAEncryption, SHA1WithRSA/ISO9796-2, MD2WithRSAEncryption, RIPEMD160WithRSAEncryption, SHA1WithRSAEncryption, RIPEMD160WithRSAEncryption, MD5WithRSA/ISO9796-2 RIPEMD160WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2 algorithms for digital signatures | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
40. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|