|
More tags: data destroyer, disk wipe, purge, file purge, secure deletion, secure file deletion, sanitize, sanitization, dod, defense, 5220.22-m, soft disk, file deletion software, file deletion program,
|
Category : |
Utilities - Security |
|
|
|
Platform : |
Win98, WinME, WinNT 4.x, Windows2000, WinXP, Windows2003, Windows Vista Starter, Windows Vista Home Basic, Windows Vista Home Premium, Windows Vista Business, Windows Vista Enterprise, Windows Vista Ultimate |
|
|
Price : |
USD 34.99 |
|
|
Developer: |
|
|
|
Rating : |
|
|
|
License : |
Shareware |
|
|
Limitations: |
20 Days |
|
|
Date : |
07/31/2008 |
|
|
Size : |
1.71 MB |
|
|
Software In :
Utilities
Security
data destroyer, disk wipe, purge, file purge, secure deletion, secure file deletion, sanitize, sanitization, dod, defense, 0-m, hard disk, file deletion software, file deletion program,
|
When Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (which take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery). In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges data in files, where 'purge' means to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted. Data Destroyer can purge: (a) a single file, (b) all files in a folder, (c) a specified subset of files in a folder, (d) all files in a folder and in selected subfolders of that folder, (e) all free space on a disk and (f) an entire disk (apart from selected top folders). This software checks for possible errors in user input, and is designed to minimize the chance of accidentally purging a file that you wish to keep. Another feature of Data Destroyer is that you can get an estimate of the time required to perform a purge operation. A lengthy purge operation may require several hours, or even days, and if you did not have an estimate of the time needed before beginning the operation you might get worried, not knowing how long it still has to run.
Monkey`s PlaylandSickApps - Lorde Lovers Edition! Amazing App For All Lorde Fans!Sports Split Step Tennis PlusENRIK`STotalMix FX for iPadd-capitatrix HD轻松听懂VOAKoolBook Math Grade 1Zombie Skate Freaks HDI Love 御宿PrixieFast Facebook Video Downloader
|
|
Also See
1)
Outlook Express Protector
Outlook Express Protector is designed for controlling access to Outlook Express and its e-mail and address data bases. It does not encrypt protected files and folders, however no programs can get acce...
License:Shareware USD 29
Size:0.62 MB
2)
InstallBlock
Install-Block allows you to require a password to be entered in order for new software to be installed on your computer. An ideal solution for parents, employers, and teachers who seek to secure their...
License:Shareware USD 19.95
Size:3.55 MB
3)
StormWindow 2000
Cetus StormWindow [TM] for Windows 2000 will allow the authorized user to add several types and degrees of protections to the desktop and system of a Windows 2000 computer. Intelligent use of StormWin...
License:Shareware USD 30
Size:1.25 MB
stormwindow, stormwindows, security, cetus, windows, windows 000, windows k, win000, wink, win k, registry, explorer, password,
4)
IDFile
File verification utility, uses SHA-2 algorithm....
License:Freeware USD 0
Size:0.22 MB
5)
CHAOS Public Key
CHAOS+PK uses the newest chaos. It is high speed and allows variable-length keys, making protection very reliable and suitable for use in working. Uses the Public Key for encryption CHAOS keys by send...
License:Shareware USD 59.95
Size:0,4 MB
6)
ANTITHIEFWARE
ANTITHIEFWARE is a program that eliminates all adwares, spywares, viruses, Dialers, and hijackers that might exist on your PC. ANTITHIEFWARE is a program that uses a database with tens of thousands fi...
License:Shareware USD 29.99
Size:0.45 MB
7)
asquared HiJackFree
a-squared HiJackFree is a detailed system analysis tool which helps advanced users to detect and remove all types of HiJackers, Spyware, Adware, Trojans and Worms. Manage all types of Autoruns on your...
License:Freeware USD 0
Size:1.54 MB
8)
Privacy Restorer
Your PC knows a lot about you. What websites you’ve visited. What you’ve seen and downloaded. Your passwords, personal preferences, files you’ve used, programs you’ve installed, your usage hab...
License:Shareware USD 29.95
Size:0.64 MB
9)
Privacy Keeper
Privacy Keeper is powerful privacy software to erase online Internet tracks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection tool that securely deletes online Internet...
License:Freeware USD 0
Size:6.8 MB
10)
Beautiful Spyware Remover
Beautiful Spyware Remover is a popular and easy-to-use tool, Is the only company in the world that offers a 100% removal guarantee. Why accept a "solution" with anything less than 100%? With Beautiful...
License:Shareware USD 59.95
Size:2.12 MB
Tags: spyware, adware, remove, antispyware, remover, removal, spyware remover, remove spyware, adware remover
|
1)
Secure Store
Do you ever find yourself forgetting your passwords or searching endlessly for that little piece of paper that you wrote them on? We have the solution: Secure Store 2.0 stores your passwords on your s...
License:Commercial USD 14.99
Size:2.34 MB
2)
Wincph encryption software
file and folder encryption software.It protect the privacy of your sensitive files and e-mail messages by encrypting them with the highest level of security.Includes ability to store several files and...
License:Shareware USD 24.95
Size:1.43 MB
3)
Remove History
Did you know that all your surfing history is being recorded in secret hidden files on your PC? Is there pornography on your PC? Are you sure? Neteraser is a great remove history software that can sca...
License:Shareware USD 29.95
Size:0.82 MB
remove history, remove history, remove history program, remove history utility,
4)
PCAnalyzer
PCAnalyzer is an advanced small tool that analyzes various Registry keys searching for souspicious values. PCAnalyzer's main features: Registry Scan and Fix, Processes management, Undeletable files.. ...
License:Freeware USD 0
Size:0.14 MB
5)
Vista Smoker Pro
Vista Smoker Pro allows you to change various settings in the Windows Registry. These settings can improve the performance for your computer drastically. Our service manager allows you to use service ...
License:Shareware USD 39.95
Size:3.53 MB
6)
Watchman
We're glad to present you with a new version of Watchman, an advanced application firewall. Watchman restricts access to programs easily, keeps an eye on your files, and monitors application usage. Wa...
License:Shareware USD 39.00
Size:1.33 MB
7)
Outlook Password Recovery
Outlook Password Recovery is a program to recover lost or forgotten passwords to the Microsoft Outlook 2003/XP/2000/98/97 password-protected Personal Storage files (*.pst). All passwords are recovered...
License:Shareware USD 29.95
Size:0.41 MB
8)
Desktop Lock
Desktop Lock is a computer security protection and access control software product, you can use it to lock computer to prevent people from accessing your private documents and resources. When the comp...
License:Shareware USD 25
Size:0.59 MB
9)
Backup Mate
Backup Mate makes it easier than ever before to secure your data by making regular backups of your files. Use BackupMate to protect your important data, music and photo files from accidental delete, o...
License:Shareware USD 29.99
Size:1.24 MB
10)
System Maid
Registry stores all kinds of information, such as wallpaper and fonts, hardware configuration data, security policies, user preferences (etc.). Damaged Registry means a "brain"-damaged system. Registr...
License:Shareware USD 19.95
Size:1.28 MB
Tags: backup, system, delete, remove, optimize, repair, error, activity, uninstall, junk, temporary
|
|
More tags: data destroyer, disk wipe, purge, file purge, secure deletion, secure file deletion, sanitize, sanitization, dod, defense, 0-m, hard disk, file deletion software, file deletion program,
|
|