Page of 177
First page | Prev | Next | Last page |

Cr-Zap2k

Category: Windows Hacking, Destructive Tools, File Wiping

Title: Cr-Zap2k

Format: Win9x/Me/NT/2000

Description: What is CR-Zap2K? CR-Zap2K is a file shredder. The Facts It is a little know fact that when you delete a file using Windows Explorer (or any other program that uses the standard delete function provided by Windows or DOS) the file doesn't get erased. Instead the space on the disk where the file used to be, is marked by Windows as free space. This means the file data remains there and anyone can easily recover the file using an Undelete program. (available for around ú30/$50) So if you want your files to be safely deleted, use CR-Zap2K. CR-Zap2K will not only delete the file it will overwrite it several times with random data so recovery is next to impossible. There is only one more secure method and that is to destroy the disk on which the file is located, which is a little severe!

Download Now



Eraser

Category: Windows Hacking, Destructive Tools, File Wiping

Title: Eraser

Format: Win9x/Me/NT/2000

Description: Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.

Download Now



Evidence Eliminator

Category: Windows Hacking, Destructive Tools, File Wiping

Title: Evidence Eliminator 2.02

Format: Win9x/Me/NT/2000

Description: Securely deletes the following: windows swap files, recycling bin, temporary files, user profiles, recent documents, run history, find computer/file history, all sorts of ie/netscape stuff like history/cookies/cache, outlook/netscape mail stuff, custom files and folders (add what you want to the list), unwanted file types (.chk, .tmp, .gif, etc), registry backups, free space/clusters, and much more.free 30-day trial evaluation

Download Now



Executive Document Shredder

Category: Windows Hacking, Destructive Tools, File Wiping

Title: Executive Document Shredder

Format: DOS

Description: Executive Document Shredder eliminates a file in such a way that it cannot be recovered. This is useful for sensitive data that you wish to keep private. A normal DOS/Windows file deletion only removes all references to a file. The data remains on the drive until another file happens to overwrite it. Anyone with a disk utility and a desire to read the file can usually recover the file in its entirety, even years after it has been deleted. EDS will shred a huge 16MB file in less than 30 seconds on most hard drives. Shredding of normal-sized documents is almost instantaneous. This update has fixed a bug that occurs during the shredding of large directories.

Download Now



File Shredder

Category: Windows Hacking, Destructive Tools, File Wiping

Title: File Shredder 2.9

Format: Win9x/Me/NT/2000

Description: File Shredder for Windows 9x/NT is a small file utility that will completely erase the contents of sensitive files and folders that you specify. Normal file deletion only removes a file's directory entry, but leaves the data contained in the file on your disk drive. File Shredder completely overwrites the contents of a file and then deletes it. To shred files and folders simply drag them to the File Shredder icon in the same way you would the Recycle Bin. You can also shred files by right-clicking on them from the MS Windows Explorer and selecting the Send To item on the popup context menu.File Shredder has two file wiping methods available, a standard two-pass file clearing procedure and an NSA approved seven-pass file erasure method. For normal file deletion operations the two-pass method should be sufficient, but if you want to thoroughly erase a file's contents before deleting it the NSA approved method may be used.

Download Now


First page | Prev | Next | Last page |