Mutilate File Wiper 2.92
Delete your sensitive files permanently. Mutilate File Wiper is a file remover that prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrites. Mutilate supports complete folder and subfolder shredding. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files.
See also: swapfile, swap file, washer, clean, purge, undelete, delete, unerase, eraser, erase, secure deletion, disk eraser, data recovery, removal, shredder, shred, file wiper, wipe, security, forensic
Data Destroyer 6.57
A program for secure file deletion and disk wipe which destroys (or purges, by overwriting) data in files on floppy, ZIP or hard disk so that the data cannot be recovered. A single file can be purged or, in batch mode, multiple files (in multiple folders) can be purged in one operation. Allows user-specifiable type of purge. Purge speed can be tested for accurate estimation of purge times.
See also: hard disk, 5220.22-M, Defense, DoD, sanitization, sanitize, secure file deletion, secure deletion, file purge, purge, disk wipe, data destroyer, file deletion software, file deletion program
Swipe Pro 1.0
Swipe Pro uses two scientifically proven methods designed by the US Defense Department and Defence Signals Directorate, as well as proprietary methods to securely overwrite and destroy information from hard drives. Simple yet ultra secure file eraser.
See also: Erase, DOD, File Destruction, File Eraser, Swipe Pro - Secure File Deletion, Shredder, Delete, Undelete
Master Shredder 1.0.3
Master Shredder is a professional files wiping utility. Files deleted by this software cannot be recovered by any third party software, even by special hardware devices (analyzing remanent magnetization of hard drive's surface).
Master Shredder can securely delete your important files using 18 wiping algorithms, including U.S. DoD 5200.28, NATO Data Destruction Standard, U.S. Air Force Standard, U.S. Army Standard, Russian GOST P50739-95, others
See also: wiping, shredding, wipe, shred, shredder, secure, files, file, deletion, deleting, gost, gutmann, schneier, dod, vsitr, quick wipe
File Security Manager 188.8.131.52
This program allows you edit access rights for users and groups (advanced file and folder permissions), change owner of the files, view effective permissions in Windows XP Home. Interface of the program is like XP Pro Access Control editor. The program includes even more useful features: Security Wizard, Secure deletion. Get the power of Win XP Pro. And... Make your Windows XP Home like windows XP Professional Now - Get File Security Manager.
See also: rights, user, prevent, lock, secure, tab, security, Permissions assignment, Deletion, Wipe, Secure, File System, File management, Permissions, XP Home Edition, Home, Laptop, Access Control, Security, NTFS, securing, remove, restrict, deny
ShyFile - File and Email Security 6.24
ShyFile generates files that carry your secured contents to be attached to an email or to be published as a webpage. Simple but yet poweful 1on1 symmetric key-entries are employed for the email security and the encryption of HTML-pages, single binary files as well as whole folders. Any file can be used as a key. A File Shredder is included to thoroughly erase files from your hard drive. Max. 6144-bit depth of encryption.
See also: file encryption, cryptography, classified email, decode, encode, secure mail, HTML, email security, email encryption, document encryption, file deletion, file wiping
LandlordBG.com Secure Deletion 1.0
www.LandlordBG.com presents Secure Deletion. Paranoia dictates that sometimes when we want a file deleted, we want it to stay deleted so that no one can remove our hard disks and find any magnetic remnents of files we have created and later deleted. Our government insists that three rewrites of the file are sufficient to destroy the image. SecureDelete assumes the government standard is false and that it takes more to accomplish a total erasure
See also: secure, delete, undelete, landlordbg, landlordbg.com, www.landlordbg.com, secure deletion, file deletion
Crisystec Sentry.365 3.0
CrisysTec Sentry takes care of all of your privacy concerns. With state of the art multiple auto stealth, only you would know CrisysTec Sentry is working in the background collecting sensitive data and destroying it LIVE while still maintaining your privacy. You can also use the advanced settings to discover powerful additional cleaning facilities. CrisystTec Sentry comes with a very attractive, XP style interface and is very simple to use.
See also: erase data, locked dll, harddrive, privacy software, gutt man, absolute data destruction, hard drive data destruction, wipe, wipeinfo, secure, killdisk, erase, erasing, wipefile, diskwipe, deletion, cleandrive, evidence eliminator, unrivaled defence, military defence, Internet Security Tools, secure, secure delete, delete, security, privacy, protection, cookies, cache, security suite, guttman, dod, industry, security companies, business security, security, commerce security, security software, private, temp files, web bug, cache, security, stop popups, pop-up killer, popup blocker, ad blocking, stop popup, eraser, clean cache, clean, delete cookie, cookie, temp files, cache, security, popup, maximum security, erase, popup ad filter, popup killer, pop-up killer, popups, stop popups, pop-up, pop-ups, guardwall.com, erase, hide, online privacy, internet privacy, free software, privacy news, privacy software, online privacy, web bug, cookies, erase, privacy, shareware, freeware, internet tools, protection
Shred Agent 1.1
Shred Agent works at the hardware level, wiping your files completely, eliminating any possibility of recovery. What makes Shred Agent different from most other file wiping utilities is the capability to control the wiping of files in the background. For example you can configure the filters to wipe temporary files created by office programs.
See also: shred agent, capture deletion, background wipe, wipe, shredder, disk wipe, wipe files, sensitive files, unwanted files, delete, secure, erase, hard disk, cookie, history, cache, NSA
FileKancellator is a tool allows you to delete files and directory and destroy their content in a secure way protecting your privacy. After using this tool is impossible recover these files deleted. Is a file, document shredder that remove sensitive data.
See also: delete permanently, secure delete, privacy protection, unrecoverable files, destructive deletion tools, wipe disk, wipe files
Secure File Deletion 11.04.01
Just in case you are searching for the proper option to delete file permanently from your computer?s hard drive, then all that you have to do is use Kernel File Shredder. This tool is very easy to operate and at the same time facilitates its user with multiple options to shred files and folders without any wastage of time. Perhaps, this is one such effective software that even allows user to shred files and folders both manually & automatically.
See also: secure file deletion, secure delete, file shredder, secure erase, document shredding, wipe free space, delete file, delete files, permanently delete files, how to permanently delete files, delete files permanently, file shredder windows 7
Secure Eraser 4.0
Applying five well-known and acknowledged deletion standards Secure Eraser deletes your sensitive data irretrievably - and offers an easy to use user interface. Additionally to overwriting sensitive files with random data Secure Eraser supports other acknowledged deletion standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard - and offers several system and Windows Registry cleaning options either.
See also: Erase, Delete, Deletion, Secure, Save, Safe, Gutmann, NISPOM, DOD, File, Data, Folder, Remove
Ken Messenger 5.0.2
Ken Messenger is an Instant Messaging software. Works either with our free public server or with your own private Instant Messenger Server. It allows companies, organisations, institutions and dispersed workgroups to create and control their own private messaging network (Free up to 5 connected users) without having to use and depend on public IM servers.
See also: training, distance learning, distance, learning, colleges, college, universities, university, schools, school, educational, education, dispersed, privacy, private, IM network, networks, network, networking, extranet, VPN, intranet, internet, economical, cost-effective, cost effective, return on investment, ROI, compliance, compliant, finance, financial, medical, HIPAA, rules, SEC, NASD, off-line, offline, on-line, online, file transfer, files, file, message, messages, traffic, encryption, encrypted, security, secure, non-profit, Sonork EIM, GTV, Sonork, organizational, organization, industry, government, business, company, professional, EIM, enterprise instant messaging, enterprise, messenger, messaging, instant, instant messenger, instant messaging, Instant Messenger Server, KenMessenger Server, Ken Messenger Server, Instant Messenger, Messenger, KenMessenger, Ken Messenger, Wilcom2, collaboration, collaborating, work-group, workgroup, webapp, web application, web applications, application, applications, webapps, conference, conferencing, chat, chatting, chatrooms, peer-to-peer, p2p, peer to peer, server, servers
Secrets Protector Pro 2006 3.1
A three-in-one privacy protector built for those who like their personal stuff handled carefully. This product gives you the features of a folder locker, a secure eraser and a privacy manager. The Hide Secret File?s proud successor, enforced with strong encryption, secure file deletion technique and a smart built-in trace remover will help you to protect your secret data and online privacy better than ever.
See also: delete, eraser, wipe, privacy, unhide, private, erase, secure, safe, invisible, secret, guard, folder, protect, security, file, lock files, hide folders, lock folder, private file, hide, sensitive, disk, lock, evidence
PurgeIE Pro 3.02
This superb utility eliminates your surfing tracks. Cache files, Cookies, Visited URLs, Typed URLs, History Folders, Strays, Recent Links, the IE UserData folder, Recycle Bin and the Windows Temp Folder are the categories you can eliminate. PurgeIE Pro includes 'secure erase' and support for Plugins. PurgeIE Pro manages its cleanup functions without requiring a system restart. Supports IE-4 thru IE-6. A recent upgrade implements a tabbed User i
See also: strays, autocomplete, privacy, tracks, dropdown, typed urls, cookie blocking, history, cookies, cookie, cache, explorer, internet, userdata, index.dat, purge, purgeie, plugins, secure delete, secure erase, washer, wash, tif, searches
CleverCrypt Lite (Freeware) 1.5
Create a password protected, fully encrypted hard drive to store all of your private files in. Just copy your files into your CleverCrypt drive for total protection. Free!
See also: business, secure hard drive, encrypt hard drive, secure data, virtual drive, password protect, encrypt files and folders, secure drive, laptop security, notebook security, encryption, computer, doctor, lawyer, medical, confidential, freeware
Free for individual use, Tunnelier is a fast, robust, easy to use SSH client for Windows (all versions) with advanced graphical SFTP file transfer and scriptable console-mode SFTP; VT100 and xterm terminals; dynamic and manual TCP/IP tunneling; auto-reconnect feature; single-click Remote Desktop forwarding; FTP-to-SFTP protocol bridge; user authentication with Kerberos (GSSAPI) and public keys. Highly customizable to satisfy special requirements.
See also: console, remote desktop, file transfer, encryption, encrypted, gssapi, kerberos, public key, security, secure, bvterm, vt-100, vt100, xterm, SOCKS, proxy, port forwarding, tunneling, dynamic, ssh2, sftp, ssh, free, terminal, telnet, ftp
MICR Font Set 3.4
Print your own checks on a laser printer using Windows TrueType or PostScript fonts. The bottom line on a check must be printed in a special font called MICR using magnetic ink. This font includes the numbers 0 through 9 and four special characters: On-Us, Transit, Amount, and Dash. This package also includes Secure Fonts. They let you print payee names and check amounts in dollars, pounds sterling, euros, or the yen that are very hard to alter.
See also: type, ttf, truetype, true, toner, micrfonts, micrfont, magnetic, laserjet, laser, amount, printing, print, Number, number, signature, security, Secure, secure, cheques, cheque, checks, check, fonts, font, e13b, E13-B, micr, MICR
Secure Image Pro 4.0
Secure Image Pro is recommended image protection for photographers and advertising professionals. Pro supporst Mac as well as PC visitors. Options include Domain Lock, targeted hyperlink on the image, and several display options, status messages, picture frames, batch file import and processing, multi-registry for use on several domains. Pro will enctrypt more than 3,000 images on a single click.
See also: protect, image, pics, photo, encrypt, safe, secure, copy, capture
z/Scope Warp 4.0
z/Scope Warp is a secure, GUI/HTML-enabled terminal emulator for accessing AS/400 iSeries and IBM Mainframes from Microsoft Windows platforms. Runs as a stand-alone and web-browser enabled, has multi-session/multi-connection capapabilities and provides secure access to SSL 2,3 and TLS 1.0 enabled hosts. Powerful, easy to use and customizable, allows system administrators to easily rejuvenate and integrate the legacy world with Windows platform.
See also: IBM, stand-alone, browser-based, 5250 emulation, 3270 emulation, 5250, 3270, terminal emulator, terminal emulation, secure, web enabled, Web-to-Host, GUI, HTML, zSeries, iSeries, AS/400, TN3270, TN5250, encryption, mainframe