|Audio & Multimedia|
|Games & Entertainment|
|Home & Hobby|
|Network & Internet|
|Security & Privacy|
Mutilate File Wiper 2.92
Delete your sensitive files permanently. Mutilate File Wiper is a file remover that prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrites. Mutilate supports complete folder and subfolder shredding. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files.
See also: swapfile, swap file, washer, clean, purge, undelete, delete, unerase, eraser, erase, secure deletion, disk eraser, data recovery, removal, shredder, shred, file wiper, wipe, security, forensic
Data Destroyer 6.57
A program for secure file deletion and disk wipe which destroys (or purges, by overwriting) data in files on floppy, ZIP or hard disk so that the data cannot be recovered. A single file can be purged or, in batch mode, multiple files (in multiple folders) can be purged in one operation. Allows user-specifiable type of purge. Purge speed can be tested for accurate estimation of purge times.
See also: hard disk, 5220.22-M, Defense, DoD, sanitization, sanitize, secure file deletion, secure deletion, file purge, purge, disk wipe, data destroyer, file deletion software, file deletion program
Swipe Pro 1.0
Swipe Pro uses two scientifically proven methods designed by the US Defense Department and Defence Signals Directorate, as well as proprietary methods to securely overwrite and destroy information from hard drives. Simple yet ultra secure file eraser.
See also: Erase, DOD, File Destruction, File Eraser, Swipe Pro - Secure File Deletion, Shredder, Delete, Undelete
Master Shredder 1.0.3
Master Shredder is a professional files wiping utility. Files deleted by this software cannot be recovered by any third party software, even by special hardware devices (analyzing remanent magnetization of hard drive's surface).
Master Shredder can securely delete your important files using 18 wiping algorithms, including U.S. DoD 5200.28, NATO Data Destruction Standard, U.S. Air Force Standard, U.S. Army Standard, Russian GOST P50739-95, others
See also: wiping, shredding, wipe, shred, shredder, secure, files, file, deletion, deleting, gost, gutmann, schneier, dod, vsitr, quick wipe
File Security Manager 220.127.116.11
This program allows you edit access rights for users and groups (advanced file and folder permissions), change owner of the files, view effective permissions in Windows XP Home. Interface of the program is like XP Pro Access Control editor. The program includes even more useful features: Security Wizard, Secure deletion. Get the power of Win XP Pro. And... Make your Windows XP Home like windows XP Professional Now - Get File Security Manager.
See also: rights, user, prevent, lock, secure, tab, security, Permissions assignment, Deletion, Wipe, Secure, File System, File management, Permissions, XP Home Edition, Home, Laptop, Access Control, Security, NTFS, securing, remove, restrict, deny
ShyFile - File and Email Security 6.24
ShyFile generates files that carry your secured contents to be attached to an email or to be published as a webpage. Simple but yet poweful 1on1 symmetric key-entries are employed for the email security and the encryption of HTML-pages, single binary files as well as whole folders. Any file can be used as a key. A File Shredder is included to thoroughly erase files from your hard drive. Max. 6144-bit depth of encryption.
See also: file encryption, cryptography, classified email, decode, encode, secure mail, HTML, email security, email encryption, document encryption, file deletion, file wiping
LandlordBG.com Secure Deletion 1.0
www.LandlordBG.com presents Secure Deletion. Paranoia dictates that sometimes when we want a file deleted, we want it to stay deleted so that no one can remove our hard disks and find any magnetic remnents of files we have created and later deleted. Our government insists that three rewrites of the file are sufficient to destroy the image. SecureDelete assumes the government standard is false and that it takes more to accomplish a total erasure
See also: secure, delete, undelete, landlordbg, landlordbg.com, www.landlordbg.com, secure deletion, file deletion
Crisystec Sentry.365 3.0
CrisysTec Sentry takes care of all of your privacy concerns. With state of the art multiple auto stealth, only you would know CrisysTec Sentry is working in the background collecting sensitive data and destroying it LIVE while still maintaining your privacy. You can also use the advanced settings to discover powerful additional cleaning facilities. CrisystTec Sentry comes with a very attractive, XP style interface and is very simple to use.
See also: erase data, locked dll, harddrive, privacy software, gutt man, absolute data destruction, hard drive data destruction, wipe, wipeinfo, secure, killdisk, erase, erasing, wipefile, diskwipe, deletion, cleandrive, evidence eliminator, unrivaled defence, military defence, Internet Security Tools, secure, secure delete, delete, security, privacy, protection, cookies, cache, security suite, guttman, dod, industry, security companies, business security, security, commerce security, security software, private, temp files, web bug, cache, security, stop popups, pop-up killer, popup blocker, ad blocking, stop popup, eraser, clean cache, clean, delete cookie, cookie, temp files, cache, security, popup, maximum security, erase, popup ad filter, popup killer, pop-up killer, popups, stop popups, pop-up, pop-ups, guardwall.com, erase, hide, online privacy, internet privacy, free software, privacy news, privacy software, online privacy, web bug, cookies, erase, privacy, shareware, freeware, internet tools, protection
Shred Agent 1.1
Shred Agent works at the hardware level, wiping your files completely, eliminating any possibility of recovery. What makes Shred Agent different from most other file wiping utilities is the capability to control the wiping of files in the background. For example you can configure the filters to wipe temporary files created by office programs.
See also: shred agent, capture deletion, background wipe, wipe, shredder, disk wipe, wipe files, sensitive files, unwanted files, delete, secure, erase, hard disk, cookie, history, cache, NSA
FileKancellator is a tool allows you to delete files and directory and destroy their content in a secure way protecting your privacy. After using this tool is impossible recover these files deleted. Is a file, document shredder that remove sensitive data.
See also: delete permanently, secure delete, privacy protection, unrecoverable files, destructive deletion tools, wipe disk, wipe files
Secure File Deletion 11.04.01
Just in case you are searching for the proper option to delete file permanently from your computer?s hard drive, then all that you have to do is use Kernel File Shredder. This tool is very easy to operate and at the same time facilitates its user with multiple options to shred files and folders without any wastage of time. Perhaps, this is one such effective software that even allows user to shred files and folders both manually & automatically.
See also: secure file deletion, secure delete, file shredder, secure erase, document shredding, wipe free space, delete file, delete files, permanently delete files, how to permanently delete files, delete files permanently, file shredder windows 7
Secure Eraser 4.0
Applying five well-known and acknowledged deletion standards Secure Eraser deletes your sensitive data irretrievably - and offers an easy to use user interface. Additionally to overwriting sensitive files with random data Secure Eraser supports other acknowledged deletion standards such as US DoD 5220.22-M ECE, German standard and Peter Gutmann standard - and offers several system and Windows Registry cleaning options either.
See also: Erase, Delete, Deletion, Secure, Save, Safe, Gutmann, NISPOM, DOD, File, Data, Folder, Remove
DiscoverStation turns one computer into ten and includes a suite of public management software. Includes print control, time-management, privacy protection, and web filtering. DiscoverStation provides a simple, stable, & reliable solution to the needs of libraries, schools & any public computing environment. Discoverstaion drastically reduces the cost, management, and maintenance efforts of desktop computers, by up to 90%.
See also: Linux distribution, Fedora, Red Hat, desktop Linux, workstation, public computing, education, academic institutions, colleges, universities, schools, library software, libraries, Userful, DiscoverStation, secure, desktop, PCs, public
NetSupport Manager - PC Remote Control 9.0.0
Perform remote support and management on multiple systems simultaneously over a LAN, WAN and the Internet with this PC remote control software. Supports mobile users effortlesly and also remote sites and servers. Provides speedy, secure remote PC access, remote deployment, a hardware and software inventory, centralised management, file transfer, remote helpdesk, support for Pocket PC and Linux, a new whiteboard feature and record and replay.
See also: PC remote control software, asset management, secure remote desktop access, remote helpdesk, pocket pc, dynamic inventory, remote file transfers, mobile computing, system monitoring, LAN, WAN, remote deployment, linux
ECMerge Pro (Linux) 1.2
ECMerge compares and merges files and folders, side-by-side or 3-way. Syntax colouring for many languages. Configure third-party programs to import PDF, Office documents, or open ZIP/RAR archives. XML pretty-printing. In-line differences. Security distance for merges. Save your work at intermediate situation and restart it later! Generate patch/XML/HTML reports. Good replacement for many SCC own merge tool. Available also for Windows&Solaris.
See also: merge, compare, diff, files, folders, directories, 3-way, side-by-side, syntax colouring, comparison, synchronization, compare text, file comparison, compare files, folder compare, file difference, difference, in-line, XML, secure, ignore, regular expression
Application Lock and File Encrypt 6
Password protect your programs and encrpyt files and folders for free! Users can add password protection to any Windows program. Two types of file and folder protection, including encryption, provides you with all-in-one solution for protecting your computer from unauthorized access. Use Folder Lock to hide protected folders. Features to lock the desktop, boot keys, task keys, blocking software installations, internet access and Windows Startup.
See also: encryption, security, secure, lock, computer, desktop, mouse, programs, password, protection
The tetraguard solution will automatically encrypt all data written onto removables, without the user having to do anything. The data is then decrypted, again automatically, on a computer that has been issued with the right key. When using our new tool you have no loss of functionality at your interfaces. The software operates without any administrative effort and can be self-installed by anyone.
See also: security, secure, encrypt, data theft, usb, external HD, DVD, save, protect, monitor, network
CC File Transfer 1.4
is a web based file transfer software built for people that need transfer file pc to pc regularly. It features in ease of use, speed, reliability, and security. CC File Transfer eliminates the hassles of FTP and limitations of Email.
See also: file transfer, file transfer software, transfer file, secure file transfer
Active Kill Disk - Hard Drive Eraser 5.0
Active KillDisk is a quality security application that destroys data permanently from any
computer that can be started from floppy CD USB. Active KillDisk Professional conforms to US Department of Defense clearing and sanitizing standard DoD 5220.22-M. You can be sure that once you wipe a disk with Active KillDisk, sensitive information is destroyed forever.
See also: erase, eraser, disk eraser, recover, recovery, data, wiper, dos, erase hard drive, secure formatting, hard, drive, disk, format, formatting, erasing, computer, computers, clean up, cleanup
This well known terminal emulator gets you online via telnet, SSH/SSH2, modem and ISDN. It's outstanding user interface, solid vt102/vt220 and Linux terminal emulations make ZOC the preferred tool for everyone who has to access Unix/Linux shell accounts from a Windows or Mac OS X platform. Lots of options, tabbed sessions, fast screen output and scrollback buffer, powerful scripting and countless other features make it an exceptional tool.
See also: ZOC, VT100, VT220, LINUX, SSH, WYSE, TVI, ZMODEM, MODEM, COM, COMM, ISDN, TELNET, TAPI, TERMINAL, 3270, CRT, SECURE, POWERCOMM