|
||||||
|
||
|
Home > Shredder software |
Related keywords: file shredder |
|
|
1. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 or any other software. The program includes a file shredder that wipes the contents of your | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
2. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 PRO or any other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | EF Commander 5.00 (efsoftware.com) | ||
with capabilities to change upper/lowercase, delete function with shredder. * All long operations run with multitasking. Possible any number of operations to time with the same program instance. * User-defined commands. * Command line. * Built in file viewer, editor, Hex editor for files of ANY SIZE. * Viewer to view also graphical and multimedia files of any size. Supported | |||
Updated: 2, 2006 | Rating: 75 | Author: Emil Fickel | Size: 3607 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
4. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Kryptel 5.31 (kryptel.com) | ||
a tool for creating encrypted backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a file encryption program, enabling you to use strong cryptographic algorithms for protecting your files and folders. Kryptel supports drag and drop, and makes encryption of any number of files as easy as a single mouse | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
6. | Kryptel 5.31 (bestcrypto.com) | ||
a tool for creating encrypted backups and an integrated file shredder for secure deletion of sensitive data. Kryptel is a file encryption program, enabling you to use strong cryptographic algorithms for protecting your files and folders. Kryptel supports drag and drop, and makes encryption of any number of files as easy as a single mouse | |||
Updated: 2, 2006 | Rating: 0 | Author: Inv Softworks | Size: 4436 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
7. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
Windows 9x-Xp; Disk Analysis, for analyzing your hard disk; Secure shredder, to delete files permanently; Use Internet connection Booster, to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
8. | 12Ghosts PowerGee 7.10 (12ghosts.com) | ||
get-the-job-done privacy tools, 12-Wash, 12-Popup-Killer, and 12-Shredder. Security package with three get-the-job-done privacy tools, 12-Wash, 12-Popup-Killer, and | |||
Updated: 9, 2005 | Rating: 0 | Author: Philip Ahrens | Size: 1600 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
9. | 12Ghosts ShellX 7.10 (12ghosts.com) | ||
and starts a DOS program without closing afterwards. Integrated 3x shredder, fast file compression, search and replace text in folders and subfolders, and set the date and time created, modified, or last accessed. Add new commands to the right-click menu of files and folders. Copy path to clipboard | |||
Updated: 9, 2005 | Rating: 66 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
10. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
recommends seven passes for top security. With this program it's easy to choose the right method of overwriting. Don't let any compromising data destroy your life! Destroy the data with this easy-to-use tool. An absolutely vital extension for every Windows user. Overwrite files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
11. | AES Home 4.0 (abensoft.com) | ||
AES Home is the utility program that creates active AES-files for Windows. Active AES-files are executable programs (EXEs) that contain a AES-file and the software necessary to decrypt the information and encrypt answer messages. Users can create active executable AES-files that anyone can use to encrypt | |||
Updated: 9, 2005 | Rating: 39 | Size: 708 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
12. | AES Pro 5.5 (abensoft.com) | ||
AES Pro is the utility program that creates active public keys. Active key is an executable program that contains a public key and the software necessary to encrypt messages and decrypt the answer-back messages. Users can create active public keys that anyone can use to encrypt messages. No other software is | |||
Updated: 9, 2005 | Rating: 36 | Size: 1006 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
13. | Absolute CHAOS 3.8 (safechaos.com) | ||
privacy tools including file/folder compression, file/folder shredder. Encrypt text files, programs and entire folders giving additional security to your | |||
Updated: 9, 2005 | Rating: 0 | Size: 580 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
14. | Home CHAOS 3.5 (safechaos.com) | ||
Home CHAOS is a fast and very easy-to-use program which is able to encrypt and decrypt files of every type and even whole directory structures. For this it uses strong encryption, encryption acknowledged worldwide to be un-breakable. Encrypt text files, programs and entire folders giving additional security to your information. | |||
Updated: 9, 2005 | Rating: 0 | Size: 483 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
15. | File Shredder 2.0 (mazepath.com) | ||
and sensitive business documents. Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily recovered, including your financial | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
16. | Mutilate File Wiper 2.92 (home.att.net) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
17. | Privacy Guard 1.4 (amicutilities.com) | ||
will not protect you! Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive, which can be easily recovered by any average computer user using a undelete utility. Evan after you format your hard disk the data can still be recovered using expensive hardware and software which use forensic latency track analysis | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1183 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
18. | Privacy Guard 1.2 (amicgames.com) | ||
will not protect you! Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive, which can be easily recovered by any average computer user using a undelete utility. Evan after you format your hard disk the data can still be recovered using expensive hardware and software which use forensic latency track analysis | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1183 kb | Shareware Go to category: Communications > E-Mail Clients Similar programs | |||
19. | USA Shield 2.15 (usa.safeworld.info) | ||
USA Shield is the suite of encryption tools for personal and professional security. It allows you to protect the privacy of your sensitive files and messages by encrypting them with up to three strong cryptographic algorithms. Once the information has been encrypted, it can be stored on insecure media or | |||
Updated: 9, 2005 | Rating: 0 | Size: 527 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
20. | PAL Evidence Eliminator 1.01 (palsol.com) | ||
PAL Evidence Eliminator can automatically clean up your browser's cache, cookies, history, recent document list, and more. PAL Evidence Eliminator includes a Secure Wipe feature that allows you to specify other files and folders that you would like to have removed making them unrecoverable. You can set PAL Evidence Eliminator to run automatically in the background and clean your | |||
Updated: 9, 2005 | Rating: 0 | Author: Christian Champion | Size: 2200 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
21. | QikFix 4.4.04 (easydesksoftware.com) | ||
knife of utilities. Comprised of 10 different tools: -a file shredder, for permanently removing all traces of a file from your hard drive - a memory diagnostic utility, for not only to get the most from your RAM, but also locate memory hogs and set Swap File size to the optimum - A folder comparison utility, that allows you to compare file dates and times of one | |||
Updated: 9, 2005 | Rating: 101 | Author: Easy Desk Software | Size: 2954 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
22. | QuickWiper 7.6.3 (aks-labs.com) | ||
QuickWiper is a disk and file wipe utility. QuickWiper allows to wipe files in handy manner. Wiping free disk space option protects all the files you ever delete before beginning using QuickWiper. System Clearer clears in one-click cookies and history, IE cache and typed URLs, temporary and recent | |||
Updated: 9, 2005 | Rating: 0 | Author: AKS-Labs | Size: 922 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
23. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
24. | Invisible CHAOS 5.1 (safechaos.net) | ||
tools, including file/folder compression and encryption, file/folder shredder. Stego product for Windows with a CHAOS interface and a very large hiding capacity (~100% of carrier | |||
Updated: 9, 2005 | Rating: 56 | Size: 350 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
25. | EugeneShredder 1.20 (eugenesoft.com) | ||
EugeneShredder is a file wipe utility. With EugeneShredder you can easily wipe sensitive files from your hard disk. EugeneShredder has three security levels. You can use simple file deletion (as in Windows), wipe files with single pass wiping and also use most secure NSA erasure algorithm. EugeneShredder is a | |||
Updated: 9, 2005 | Rating: 0 | Author: Eugene Konovalov | Size: 680 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
26. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
27. | File Shredder 2.0 (mazepath.com) | ||
and sensitive business documents. Protect yourself with Windows File Shredder. Shredded files cannot be restored by any software. Free to try. Drop entire folders, 7 pass 16k rotating key destruction leaves NOTHING to recover. Windows does not physically remove deleted files from your hard drive. You think they are gone, but they can be easily recovered, including your financial | |||
Updated: 9, 2005 | Rating: 0 | Author: John Hooper | Size: 277 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
28. | File Shredder 2000 3.9 (gregorybraun.com) | ||
Shredder is a small utility that will completely erase the contents of sensitive files and folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive. File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 393 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
29. | CryptoMite 2.00 (baxbex.com) | ||
and also includes an extensive SMTP-Client. The integrated file shredder provides several secure wiping methods. After wiping files with CryptoMite the data will be lost forever and cannot be restored even with so called 'Undelete utilities'! CryptoMite also includes some non-encryption | |||
Updated: 9, 2005 | Rating: 16 | Author: Carsten Paasch | Size: 1576 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
30. | AlmerShredder 1.05 (almersoft.com) | ||
We all know that there are special utilities with the help of which practically any person can restore a file, deleted by standard means of Windows. Windows simply remotes a record about existence of a file from the file system. File content remains on your hard drive and can be restored any moment. Thus nobody can even guess what information a file contained | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
|
Home > Shredder software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|