|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
21. | BPS Data Shredder 1.2.0.0 (bulletproofsoft.com) | ||
explorer, an easy to use 'drag and drop' interface, the option to shred shred files, folders, disk free space; the 'Confirm before shred' feature, a configurable overwrite pattern and number of overwrites by using sophisticated overwriting algorithms which obliterate latent data on your hard disk, making your deleted files irrecoverable, even by expensive equipment, a | |||
Updated: 9, 2005 | Rating: 0 | Author: bulletproof soft | Size: 3062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
22. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | Cloak 8.0 (insight-concepts.com) | ||
send e-mails that appear completely blank to the naked eye, and also shred & permanently delete files from your system. In addition to protecting documents and e-mails, Cloak also provides industry standard internet trace cleaning options. Permanently erase cookies, temporary internet documents, internet history files, recently typed URLs, and much more. Cloak can also be fully | |||
Updated: 3, 2005 | Rating: 0 | Author: Team Concepts | Size: 7661 kb | Demo Go to category: Security & Privacy > Encryption Tools Similar programs | |||
24. | concat 4.0.0.0 (jddesign.freeserve.co.uk) | ||
ConCat/Split is a Windows Explorer context menu extension that provides two complementary facilities: 1. A split facility that lets you easily convert a single large file into several smaller ones. You can copy these smaller files onto floppy disks, or send them through email facilities that will | |||
Updated: 3, 2005 | Rating: 16 | Author: David Lowndes | Size: 245 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | CryptoExpert 2005 PE 6.02 (secureaction.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
26. | CryptoExpert 2003 Professional 2.87 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
27. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
28. | CryptoForge 3.2.5 (cryptoforge.com) | ||
This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
29. | Deletor 3.1 (basta.com) | ||
Deletor helps you keep your disks clean by deleting or shredding files corresponding to file name patterns or extensions that you specify. Deletor also has support for filter packs, which allow you to store sets of your most commonly used file deletion specifications. Combine this with file date filtering and | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | East-Tec File Shredder 1.0 (east-tec.com) | ||
access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
31. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
32. | File Exterminator 1.0 (geocities.com) | ||
it multiple times to prevent file recovery. You can choose to shred multiple files across subdirectories or to shred a single file. Besides that, you can specify the file mask (ex : *.txt) when you want to shred files across subdirectories. The number of shreds to perform can be customised as well. File Exterminator is basically a file shredding utility that | |||
Updated: 9, 2005 | Rating: 0 | Author: Malcolm Lim | Size: 388 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
33. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
34. | File Shredder 2000 3.9 (gregorybraun.com) | ||
folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive. File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin. You can also shred files by | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 393 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
35. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Additional Options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer. Works on Windows 2003/XP/2000/NT/Me/98 and all kinds of disk types like FAT16, FAT32, NTFS. Folder Lock | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | IECleaner 1.1 (zipstore.com) | ||
cleaning. You can also clean up all recent documents, defined folder(s), the Windows temporary folder and Windows clipboard automatically. A clean up function is available to eliminate all temporary files on your disk(s). IECleaner also provides an advanced function for file deletion | |||
Updated: 9, 2005 | Rating: 39 | Author: Atypie Software | Size: 1190 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
37. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
38. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
a folder as text, change attributes of multiple files and securely shred files. Multi-ZIP-licity is a program for processing multiple ZIP files. It extracts files from multiple archives and creates multiple archives. Extra tools allow to encrypt and decrypt files, list folders as text, change attributes and shred | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
39. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
40. | Optimize Computer 1.2 (amicutilities.com) | ||
- Accelerates your internet connection - Protects your privacy and shred unwanted files - Find and fix annoying faults - Allows you to customize your system to your needs A computer can be crammed full of stuff you don't need or want, and this can slow down the performance of Windows, your hard | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|