|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
1. | Mil Shield 4.7 (milincorporated.com) | ||
all tracks from your online or offline computer activities (it also shreds the content of the infamous INDEX.DAT files). NEW! Now cleans all Firefox tracks. NEW! SELECTIVE CLEANING. Many of the Internet Explorer tracks come from features that are good and convenient: Internet cache speeds up the | |||
Updated: 3, 2006 | Rating: 508 | Author: Ilko Tcenov | Size: 1724 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
2. | CryptoExpert 2006 Professional 6.4.3 (secureaction.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | CryptoExpert 2006 Professional 6.4.3 (cryptoexpert.com) | ||
CryptoExpert uses a real-time on-the-fly encryption system to encrypt and decrypt data. Your files are stored in the encrypted form on virtual hard drive with password authentication, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is | |||
Updated: 3, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 1900 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | Invisible Secrets Encryption Software 4.4 (neobytesolutions.com) | ||
Invisible Secrets Encryption Software 4 not only encrypts your data and files for safe keeping or for secure transfer across the net, it also hides them in places that on the surface appear totally innocent, such as picture or sound files, or web pages. These types of files are a perfect disguise for | |||
Updated: 2, 2006 | Rating: 0 | Author: NeoByte Solutions | Size: 2740 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
It is available in multi-languages. It scans all user accounts and shreds the detected spyware threats files and | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
6. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 or any other software. The program includes a file shredder that wipes the contents of your original | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 PRO or any other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
8. | Folder Lock 5.3.9 (newsoftwares.net) | ||
Additional Options include Stealth Mode, Hacker Attempt Monitoring, Shred files, AutoLock, Auto Shutdown PC, Lock your PC, Erase PC tracks, 256-bit Blowfish Encryption and Context Menu in Explorer. Works on Windows 2003/XP/2000/NT/Me/98 and all kinds of disk types like FAT16, FAT32, NTFS. Folder Lock | |||
Updated: 2, 2006 | Rating: 6296 | Author: Salman Ashraf | Size: 1941 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
9. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
10. | Deletor 3.1 (basta.com) | ||
Deletor helps you keep your disks clean by deleting or shredding files corresponding to file name patterns or extensions that you specify. Deletor also has support for filter packs, which allow you to store sets of your most commonly used file deletion specifications. Combine this with file date filtering and | |||
Updated: 2, 2006 | Rating: 82 | Size: 458 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
11. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
13. | Advanced Encryption Plug-In Pro for Windows Explorer 4.0.3 (secureaction.com) | ||
lets you encrypt files using 17 encryption algorithms and also shred/make encrypted .exe files and work with .ZIP files from context menu of Windows Explorer! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are | |||
Updated: 2, 2006 | Rating: 25 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
14. | Cryptocx v6 6.1.3 (easybyte.com) | ||
files that are PGP compatible Full key management functionality Shred (securely delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
15. | CleanMantra 3.0 (pcmantra.com) | ||
CleanMantra shreds files which compromise privacy, cleans all traces of Online Activities as well as Offline Activities through effortless, secured, user-friendly options. Increases efficiency of PC by permanently cleaning useless files through Shred Function. It enables trouble free browsing by preventing IE Browser Home Page Hijacking. Full Proof Scheduling of | |||
Updated: 9, 2005 | Rating: 0 | Author: PC Mantra | Size: 656 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
16. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the finest magnetic tracks are mixed up | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
17. | CryptoExpert 2005 PE 6.02 (cryptoexpert.com) | ||
CryptoExpert uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 851 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
18. | CryptoForge 3.2.5 (cryptoforge.com) | ||
This suite of tools enables you to safely encrypt, decrypt, and shred any type of file, entire folders and drives with ease. An included text editor allows you to create and encrypt secure documents that can be sent by any e-mail or messenger | |||
Updated: 9, 2005 | Rating: 0 | Author: Hernan Tornielli | Size: 2124 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Mutilate File Wiper 2.92 (home.att.net) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
20. | CryptoCrat 2005 4.60 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 9, 2005 | Rating: 39 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
21. | AntiSpy Pro 1.02 (softvers.com) | ||
exclude lists and filters by date. AntiSpy Pro supports secure wipe\shred files option to make sure nobody can restore it. Pro version of AntiSpy supports large list of plugins (like WinZip, WinRar , Kazaa Media Desktop,and many others). It also includes tool that allow you to create your own plugins | |||
Updated: 9, 2005 | Rating: 36 | Author: DevelopEx _ | Size: 1631 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
22. | Wiperaser 2004 6.1 (liveye.net) | ||
Wiperaser 2004 is a secure data deletion tool. Its primary goal is to wipe files, folders and registry entries in such a way that nobody can recover them. It works on FAT, FAT32, NTFS and NTFS5 volumes and supports three data wiping methods: the well known Gutmann method,the US Department of Defense (DOD) It works on FAT, FAT32, NTFS and NTFS5 volumes and supports three data wiping methods | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Reiser | Size: 4703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
23. | System LifeGuard 2.0 (neobytesolutions.com) | ||
down periodically. System LiIfeGuard 2 offers now the possibility to shred all unwanted files: you can permanently remove the files you want without leaving behind any chance of recovering those files. You can also optimize the way your disk space is used to store files using the new Disk Defragment | |||
Updated: 9, 2005 | Rating: 0 | Author: NeoByte Solutions | Size: 3273 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
24. | SecurityPlus 4.33 (softbytelabs.com) | ||
SecurityPlus! is a powerful encryption & decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and won't take long to | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
25. | Shred XP 2.00.10 (aidsoft.com) | ||
over a dozen government and industry-proven shredding methods, Shred XP returns control to you by securely deleting current files, previously 'deleted' files, the recycle bin, drive free space, file tips, names, dates, sizes, and starting sectors as well as securely removing Internet trails including Internet Explorer's history, cache and typed URLs. Additionally | |||
Updated: 9, 2005 | Rating: 16 | Author: Gale-Force Software | Size: 3063 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
26. | Optimize Computer 1.2 (amicutilities.com) | ||
- Accelerates your internet connection - Protects your privacy and shred unwanted files - Find and fix annoying faults - Allows you to customize your system to your needs A computer can be crammed full of stuff you don't need or want, and this can slow down the performance of Windows, your hard | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
27. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
a folder as text, change attributes of multiple files and securely shred files. Multi-ZIP-licity is a program for processing multiple ZIP files. It extracts files from multiple archives and creates multiple archives. Extra tools allow to encrypt and decrypt files, list folders as text, change attributes and shred | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
28. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
29. | IECleaner 1.1 (zipstore.com) | ||
cleaning. You can also clean up all recent documents, defined folder(s), the Windows temporary folder and Windows clipboard automatically. A clean up function is available to eliminate all temporary files on your disk(s). IECleaner also provides an advanced function for file deletion | |||
Updated: 9, 2005 | Rating: 39 | Author: Atypie Software | Size: 1190 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
30. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|