|
||||||
|
||
|
Home > Shred software |
Related keywords: file shred |
|
|
1. | 12Ghosts Shredder 7.10 (12ghosts.com) | ||
files, drag and shred, DoD conform, Wipe Disk. Delete even if the file is locked! No trails are left of any compromising or confidential information. Nobody will ever be able to recover files from your disk! Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the finest magnetic tracks are mixed up | |||
Updated: 9, 2005 | Rating: 251 | Author: Philip Ahrens | Size: 1500 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
2. | Advanced Encryption Package 2006 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 or any other software. The program includes a file shredder that wipes the contents of your original | |||
Updated: 2, 2006 | Rating: 105 | Author: SecureAction Research, LLC | Size: 2558 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
3. | Advanced Encryption Package 2006 Professional 4.2.9 (secureaction.com) | ||
vary, however, in terms of how difficult the process is. AEP2006 PRO's most noteworthy feature may be its flexibility: Not only can you encrypt files for your own protection but you can easily create "self-decrypting" versions of your files that others can run without needing AEP2006 PRO or any other | |||
Updated: 2, 2006 | Rating: 141 | Author: SecureAction Research, LLC | Size: 2347 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
4. | Advanced Encryption Plug-In for Windows Explorer 4.0.2 (secureaction.com) | ||
lets you encrypt/decrypt/shred/make encrypted .exe files/work with .ZIP files with using a power of standard Microsoft Windows Explorer! It integrates into Windows Explorer and allows you to work with your important files using Explorer's context menu. It is easy as 1-2-3! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael) | |||
Updated: 9, 2005 | Rating: 0 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
5. | Advanced Encryption Plug-In Pro for Windows Explorer 4.0.3 (secureaction.com) | ||
lets you encrypt files using 17 encryption algorithms and also shred/make encrypted .exe files and work with .ZIP files from context menu of Windows Explorer! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are | |||
Updated: 2, 2006 | Rating: 25 | Author: SecureAction Research, LLC | Size: 879 kb | Shareware Go to category: Security & Privacy > Password Managers Similar programs | |||
6. | AlmerShredder 1.05 (almersoft.com) | ||
need, we created AlmerShredder. This powerful program helps you to shred important files so that they cannot be restored and nobody can even guess what information a file contained. AlmerShredder has an easy-to-follow user interface and is of great help in your everyday work with important files. We | |||
Updated: 9, 2005 | Rating: 90 | Author: Max Fadeev | Size: 406 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
7. | AntiSpy 2.11 (softvers.com) | ||
exclude lists and filters by date.It even supports secure wipe\shred files option to make sure nobody can restore it. Plus it will save you a lot of space on your drives. After having performed a complete clearing of your PC, you can be sure than nobody will get information about the Web-sites you have visited, the documents you have opened, the messages you have sent and | |||
Updated: 9, 2005 | Rating: 34 | Author: DevelopEx _ | Size: 1231 kb | Shareware Go to category: Security & Privacy > Anti-Spam & Anti-Spy Tools Similar programs | |||
8. | AntiSpy Pro 1.02 (antispypro.com) | ||
exclude lists and filters by date. AntiSpy Pro supports secure wipe\shred files option to make sure nobody can restore it. Pro version of AntiSpy supports large list of plugins (like WinZip, WinRar , Kazaa Media Desktop,and many others). It also includes tool that allow you to create your own plugins | |||
Updated: 9, 2005 | Rating: 193 | Author: DevelopEx _ | Size: 1631 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
9. | AntiSpy Pro 1.02 (softvers.com) | ||
exclude lists and filters by date. AntiSpy Pro supports secure wipe\shred files option to make sure nobody can restore it. Pro version of AntiSpy supports large list of plugins (like WinZip, WinRar , Kazaa Media Desktop,and many others). It also includes tool that allow you to create your own plugins | |||
Updated: 9, 2005 | Rating: 36 | Author: DevelopEx _ | Size: 1631 kb | Shareware Go to category: Communications > Chat & Instant Messaging Similar programs | |||
10. | Asmw PC-Optimizer pro 7.6 (asmwsoft.com) | ||
to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system | |||
Updated: 2, 2006 | Rating: 264 | Author: Asmw Soft Systems | Size: 6400 kb | Shareware Go to category: System Utilities > System Maintenance Similar programs | |||
11. | BCWipe 3.07.2 (jetico.com) | ||
BCWipe solves this problem. It uses military-grade procedures to shred deleted file contents. BCWipe wipes individual files and folders, wipes free disk space, wipes the swap file to remove any possible remaining sensitive data, and wipes directory entries. BCWipe includes Task Manager to set up | |||
Updated: 9, 2005 | Rating: 24 | Author: Jetico Inc. | Size: 2651 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
12. | BPS Data Shredder 1.2.0.0 (bulletproofsoft.com) | ||
explorer, an easy to use 'drag and drop' interface, the option to shred shred files, folders, disk free space; the 'Confirm before shred' feature, a configurable overwrite pattern and number of overwrites by using sophisticated overwriting algorithms which obliterate latent data on your hard disk, making your deleted files irrecoverable, even by expensive equipment, a | |||
Updated: 9, 2005 | Rating: 0 | Author: bulletproof soft | Size: 3062 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
13. | BPS Spyware and Adware Remover 9.3.0.0 (bulletproofsoft.com) | ||
It is available in multi-languages. It scans all user accounts and shreds the detected spyware threats files and | |||
Updated: 2, 2006 | Rating: 122 | Author: BulletProof Soft | Size: 8238 kb | Demo Go to category: System Utilities > Other Similar programs | |||
14. | BPS Windows Trace Remover 5.0 (bulletproofsoft.h4host.com) | ||
strangers your intimate secrets? No, right? (Right?) But that's essentially what you're doing. After all, your browser history, cookies, and cache could be a dangerous weapons in the wrong hands. Wipe out incriminating evidence (not that there is any, of course) with Windows Trace Remover, a | |||
Updated: 9, 2005 | Rating: 77 | Author: Naglaa Elbanhawy | Size: 5479 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
15. | Cipherlok 2.1 (softlok.com) | ||
Cipherlok is a data security product that provides easy to use yet highly secure encryption of files on your PC or notebook using the Blowfish algorithm. Files or folders can be encrypted directly by right clicking them within Windows explorer and selecting Cipherlok. Files can also be assigned to be | |||
Updated: 9, 2005 | Rating: 0 | Author: Adrian Jones | Size: 2377 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
16. | concat 4.0.0.0 (jddesign.freeserve.co.uk) | ||
ConCat/Split is a Windows Explorer context menu extension that provides two complementary facilities: 1. A split facility that lets you easily convert a single large file into several smaller ones. You can copy these smaller files onto floppy disks, or send them through email facilities that will | |||
Updated: 3, 2005 | Rating: 16 | Author: David Lowndes | Size: 245 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
17. | CryptoCrat 2005 4.61 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 2, 2006 | Rating: 0 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
18. | CryptoCrat 2005 4.60 (secureaction.com) | ||
CryptoCrat 2005 is a Windows XP encryption utility. It provides ability to store important files in strong encrypted archives (compression is also supported) with using AES encryption algorithm. + Strong Encryption (many best encryption algorithms are supported) + Perferct Compression + Creating | |||
Updated: 9, 2005 | Rating: 39 | Author: SecureAction Research, LLC | Size: 847 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
19. | Cryptocx v6 6.1.3 (easybyte.com) | ||
files that are PGP compatible Full key management functionality Shred (securely delete) files Encrypt and decrypt strings and files with 448 Bit Blowfish Has the Fastest file encryption/decryption 256 Bit AES encryption/decryption for files and string Easily add Cryptocx v6 to your website or application in minutes Cryptocx is an Open PGP and AES compatible encryption component | |||
Updated: 2, 2006 | Rating: 0 | Author: EasyByte Software | Size: 3999 kb | Demo Go to category: System Utilities > Other Similar programs | |||
20. | Delete 2.10 (eBible.org) | ||
ERASE internal command that comes with the operating system. Delete's features include: * allows multiple file specifications on the command line; * optionally deletes Hidden, System, or Read Only files; * optionally prompts for permission to delete any file; * optionally deletes files in | |||
Updated: 9, 2005 | Rating: 3222 | Author: Michael Johnson | Size: 67 kb | Shareware Go to category: Business > Databases & Tools Similar programs | |||
21. | East-Tec File Shredder 1.0 (east-tec.com) | ||
access to your computer. East-Tec File Shredder securely destroys (shreds) sensitive and private files beyond recovery. Simply drag and drop files to the shredder icon on your desktop, or select the files you want to destroy directly from the Windows Explorer right-click menu. Your sensitive files will be gone for good and nobody will be able to recover your valuable corporate trade | |||
Updated: 3, 2005 | Rating: 79 | Author: Horatiu Tanescu | Size: 709 kb | Freeware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
22. | EDCrypt 3.1 (softuarium.com) | ||
MD5, RIPEMD128, RIPEMD160, SHA1, SHA256, SHA384, SHA512 - securely shreds files Help files and example projects in several languages are included in the package. EDCrypt is a stand-alone component. It does not require any other files to work. The control can be distributed royalty-free in an unlimited | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 390 kb | Shareware Go to category: Development > Other Similar programs | |||
23. | Eraser 5.3 (tolvanen.com) | ||
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with | |||
Updated: 9, 2005 | Rating: 0 | Author: Sami Tolvanen | Size: 750 kb | Freeware Go to category: System Utilities > File & Disk Management Similar programs | |||
24. | File Monster 2.6.7 (nstarsolutions.com) | ||
file name with a randomly generated name and it changes the file's creation date. It can even erase pesky hidden files, system files, and read-only files. Don't leave sensitive data on your computer: deleted files are the first place many computer savvy people will look when they are trying to discover sensitive information on your computer. Some important questions you have to | |||
Updated: 9, 2005 | Rating: 0 | Author: Jeff Camino | Size: 432 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
25. | File Shredder 2000 3.9 (gregorybraun.com) | ||
folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive. File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin. You can also shred files by | |||
Updated: 9, 2005 | Rating: 0 | Author: Gregory Braun | Size: 393 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
26. | Max Net Shield 4.2 (maxnetshield.com) | ||
by day, date, time to automate PC cleaning. Use file shredder to shred specific files or groups of files. File encryption feature to transform any file into an encrypted format. Easy decryption capability. Extend the functionality of MNS to locate and erase history files left behind by other applications such as Adobe Acrobat, JASC PaintShop Pro, RealOne Player, Adobe Photoshop | |||
Updated: 9, 2005 | Rating: 0 | Author: Maxion Software | Size: 6480 kb | Shareware Go to category: System Utilities > File & Disk Management Similar programs | |||
27. | Mil Shield 4.7 (milincorporated.com) | ||
all tracks from your online or offline computer activities (it also shreds the content of the infamous INDEX.DAT files). NEW! Now cleans all Firefox tracks. NEW! SELECTIVE CLEANING. Many of the Internet Explorer tracks come from features that are good and convenient: Internet cache speeds up the | |||
Updated: 3, 2006 | Rating: 508 | Author: Ilko Tcenov | Size: 1724 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
28. | Multi-ZIP-licity 2.0 (softuarium.com) | ||
a folder as text, change attributes of multiple files and securely shred files. Multi-ZIP-licity is a program for processing multiple ZIP files. It extracts files from multiple archives and creates multiple archives. Extra tools allow to encrypt and decrypt files, list folders as text, change attributes and shred | |||
Updated: 9, 2005 | Rating: 0 | Author: Eric Sewillo | Size: 787 kb | Shareware Go to category: System Utilities > File Compression Similar programs | |||
29. | Mutilate File Wiper 2.92 (mutilatefilewiper.com) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate File Wiper is a file | |||
Updated: 9, 2005 | Rating: 82 | Author: Craig Christensen | Size: 823 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
30. | Mutilate File Wiper 2.92 (home.att.net) | ||
is NOT secure. Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. The remaining data can be easily recovered with data recovery or forensic software. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces. Mutilate securely | |||
Updated: 9, 2005 | Rating: 0 | Author: Craig Christensen | Size: 824 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
31. | Optimize Computer 1.2 (amicutilities.com) | ||
- Accelerates your internet connection - Protects your privacy and shred unwanted files - Find and fix annoying faults - Allows you to customize your system to your needs A computer can be crammed full of stuff you don't need or want, and this can slow down the performance of Windows, your hard | |||
Updated: 9, 2005 | Rating: 0 | Author: Alexandru Marias | Size: 1611 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
32. | PlexCrypt Compression-Encryption 3.1 (plexobject.com) | ||
can be decrypted without installing PlexCrypt. PlexCrypt can also shred or deletes documents securely. It supports MD5WithRSAEncryption, SHA1WithRSA/ISO9796-2, MD2WithRSAEncryption, RIPEMD160WithRSAEncryption, SHA1WithRSAEncryption, RIPEMD160WithRSAEncryption, MD5WithRSA/ISO9796-2 RIPEMD160WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2 algorithms for digital signatures | |||
Updated: 3, 2005 | Rating: 42 | Author: Shahzad Bhatti | Size: 9000 kb | Demo Go to category: Network & Internet > Other Similar programs | |||
33. | SecureIT Encryption Software 3.1.7 (cypherix.co.uk) | ||
Secure IT 2000 is an easy to use, feature packed program that protects all your files and folders using 448bit strong Blowfish encryption. It includes a powerful, customizable file shredder. Secure IT 2000 has the ability to generate self-decrypting email attachments that allows the user to send encrypted/secure email to anyone - the recipient need not have a copy of the | |||
Updated: 2, 2006 | Rating: 0 | Author: Cypherix Cypherix | Size: 2088 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
34. | SecurityPlus 4.33 (softbytelabs.com) | ||
SecurityPlus! is a powerful encryption & decryption utility with a file viewer, thumbnails, slideshow and program selector, runs in the tray and offers full privacy of images, other files, and applications using on-the-fly encryption/decryption. SecurityPlus! is very fast and won't take long to | |||
Updated: 9, 2005 | Rating: 0 | Author: M. Purkhardt | Size: 568 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
35. | SPac 1.6.0.28 (qsc.co.uk) | ||
SPac is an easy to use, secure, and powerful application for file encryption and sharing. SPac combines both compression and encryption into the one product and utilizes a user-friendly interface to make manipulating your secure archives simple. In addition to compression and encryption SPac has a unique | |||
Updated: 3, 2005 | Rating: 21 | Author: Ewan McNab | Size: 1552 kb | Shareware Go to category: Security & Privacy > Encryption Tools Similar programs | |||
36. | TZ System Cleanser for Windows 5.0.0.2 (trackzapper.com) | ||
Shreds and Cleans cache, cookies, history, typed URLs, autocomplete memory, index.dat from your browser & temp folder, run history, search history, open/save history, recent documents, & more. Works with browsers AOL, IE, MSN Explorer, Opera, Juno & Netscape. TZ Windows Cleaner is a powerfull set of | |||
Updated: 8, 2004 | Rating: 133 | Author: Ahmad Ayman | Size: 3314 kb | Shareware Go to category: Security & Privacy > Other Similar programs | |||
37. | Wiperaser 2004 6.1 (liveye.net) | ||
Wiperaser 2004 is a secure data deletion tool. Its primary goal is to wipe files, folders and registry entries in such a way that nobody can recover them. It works on FAT, FAT32, NTFS and NTFS5 volumes and supports three data wiping methods: the well known Gutmann method,the US Department of Defense (DOD) It works on FAT, FAT32, NTFS and NTFS5 volumes and supports three data wiping methods | |||
Updated: 9, 2005 | Rating: 0 | Author: Jack Reiser | Size: 4703 kb | Shareware Go to category: System Utilities > Other Similar programs | |||
|
Home > Shred software |
|
Copyright © 2004 - 2010
allworldsoft.com
Contact Page
|