Security

General Security (File Shredders)

 

Software Spotlight!

Message To Developers: We are looking for one developer for the Software Spotlight position in this category. If you feel that you have one of the better products and are interested, please contact barter[at]thebusinessjunction.com If you would like to see what a Software Spotlight looks like please click here!
 
Note To Readers: Below you find links to what our staff considers to be the best software available in this category. Efforts have been made to assure a good selection while eliminating software that we do not feel is worthy of consideration. If you do not see it listed here you probably should not consider purchasing the product. If our readers or a developer feels that a particular piece of software should be listed please contact us with specifics and we will make every effort to give it our attention and, if worthy, we will include it in our next update.
 

12Ghosts Shredder version 7.0

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Overwrite and delete even locked files, wipe disk!

Overwrite, truncate length to zero, rename, set file date to 1/1/80, and delete files and folders. Even if the file is locked!! No trails are left of any compromising or confidential information. Nobody will ever be able to recover these files. Nobody will even find out the previous name or file size. The file can be overwritten several times with random bits so that even the finest magnetic tracks are mixed up.

You may choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends one character overwrite, one inverse overwrite, and one random overwrite for adequate security. While the NSA requires 7 passes, you may choose up to 99 write overs.

12-Shredder, of course, writes directly to the disk and flushes the file buffers after each overwriting, so that the file is overwritten on disk, not only in cache memory... This is what takes some time if it shreds more than once. (However, if you do the cleaning during shut down started by 12-ShutDown, and the computer is set to power off automatically afterwards, you don't need to care anyway.)

After overwriting the file contents, the file size is set to zero to prevent drawing conclusions from the former file size. The file is also renamed, since the name would not be removed from the drive during a normal deletion. All file dates, created, modified, and last accessed, are reset to 1/1/80 (the default in an empty directory listing). And finally, what is left, is deleted.

Besides overwriting files or folders, you can now wipe the empty space on your disk.
spacer

Read More...>>




Active@ ERASER

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Active@ ERASER - Ultimate Data Destruction Tool!

Active@ ERASER software package consists of four basic components:

  • Secure File Eraser 

    Problem: Standard Windows DELETE operation DOES NOT erase your data from your hard drive and undesired people can recover your deleted files!

    Solution: Install Active@ ERASER. It adds a new secure ERASE feature for Windows Explorer. Using this feature instead of standard Windows DELETE operation you are assured that your data has been destroyed logically and physically from any data storage device.
  • Internet Trace Eraser and Local Activities Cleaner

    Problem: When you use a computer for internet and network browsing, running applications, working with documents, listening to music or searching for files, some tracks of these activities are left on the machine. Internet and local traces of your activities can be detected and recovered! 

    Solution: Use Active@ ERASER to clean up these Internet and Local activity tracks periodically, so no one can trace your steps and invade your privacy! Scheduling is available. Netscape Navigator, Mozilla, Opera, Internet Explorer, AOL and MSN Explorer compatible. 
  • Hard Disk Drive Eraser

    Problem: Hard drive formatting or repartitioning DOES NOT erase your data physically from your data storage device. Disk information can be recovered even after FDISK & FORMAT!

    Solution: DOS-based Hard Disk Drive Eraser completely destroys all data on any type of data storage with high-end data destruction methods. It can be used within Windows as well as run from DOS boot disk.
  • Disk Wiper

    Problem: Free disk space on your hard drive is not actually free! It contains a lot of previously deleted files. Some programs writes and delete temporary data on the disk. This activity can be recovered!

    Solution: Disk Wiper function overwrites all free space on data storage. Use this function to prevent recovery of previously deleted files or software activity.

Active@ ERASER is a quality software package which includes various components required to keep your system secure from undesired data recovery. You can be sure that once you wipe a disk with Active@ ERASER full-featured commercial version, sensitive information is destroyed forever.

spacer

Read More...>>




Deletor 3.0

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Disk Cleaner and File Shredder!

Deletor helps you reduce the clutter in your disks and other storage media by deleting files and folders corresponding to your criteria. The application includes a shredding feature to destroy sensitive documents and make them virtually impossible to recover. Files can be filtered by name, name patterns including wildcards, attributes and time properties. The deletion settings are contained in a single window to help you review them at a glance. Deletor also supports filter packs to help you organize commonly used file deletion specifications and quickly recall them by name. Combine this with the command line interface to the program and you can easily automate the cleaning process with batch files, shortcuts, scripts, or a scheduler. 

Features:
  • Shred sensitive documents to prevent their recovery. 
  • Purge multiple parent folders in one operation. 
  • Filter items by name, attributes, time, date, and duration. 
  • Save and recall deletion profiles. 
  • Remove empty folders. 
  • Use command line access to create shortcuts and scripts. 
  • Preview operations and amount of disk space to be freed. 
  • Select files and folders using drag and drop.
spacer

Read More...>>




Mutilate File Wiper 2.90

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Normal File Deletion is NOT secure.

Deleting files merely removes the file system's pointer to the file, ALL THE DATA REMAINS ON YOUR HARD DRIVE OR FLOPPY DISK. Data recovery or forensic software can easily recover the files you delete. Your sensitive files may also be vulnerable to advanced recovery techniques, EVEN WHEN OVERWRITTEN, by analyzing latent magnetic traces.

Get the premier file eraser and disk free space wiper for Windows 95/98/ME/NT/2000/XP/2003Server. Mutilate securely deletes (or "wipes") sensitive files from your hard drive. Choose one of Mutilate's three security levels, or, configure a customizable level for up to 297 overwrite passes. Select target files with Mutilate's easy to use program interface, or, skip the interface altogether and right-click target files directly from Windows Explorer. With Mutilate's disk free space wiper, you can even destroy previously deleted files lurking on your hard drive. Protect your privacy!
spacer

Read More...>>




PAL Evidence Eliminator

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Powerful Privacy Protection Tool

PAL Evidence Eliminator runs automatically in the background and cleans your Internet files and history as you work, or you can have it clean at start-up or shutdown. In addition, a Shredding and Secure Wipe function is also available to completely remove files and folders making them unrecoverable by file recovery utilities. 

Protect your privacy and improve system performance.
Your computer is tracking all your actions and stores the evidence into your hard disk. Anyone else can see where you have been on Internet and the images, movies you have seen, even everything you did on your computer would leave trace on your computer. Perhaps you stumbled onto one or two adult Web sites. Perhaps by accident.

You can clear your history or empty your cache files in your browser's settings, but it will not protect you. How to Protect your Privacy, keep your Surfing private? PAL Evidence Eliminator is a great privacy tool that will. 

The fact is...your computer is spying on you and is filling up with evidence all the time, only PAL Evidence Eliminator can protect and help you. In tests, PAL Evidence Eliminator defeats most Forensic Analysis equipment as used by investigators, police and government agencies. Enjoy the benefits of PAL Evidence Eliminator, download yours now!

Evidence Eliminator Features:
  • Eliminate your online and offline tracks to protect your privacy 
  • Completely wipes out data for total privacy protection 
  • Custom wash cycles put you in control 
  • Automatic cleaning saves you time 
  • Improves your system performance 
  • All versions of Windows supported 
spacer

Read More...>>




SecureClean

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


Protect Your Personal Identity!

Identity & Information Theft – You cannot watch TV, read a magazine, or visit a bank without seeing something about identity theft. It has become the fastest growing crime in America and can no longer be overlooked. CBS News reported that every 79 seconds a thief hacks into a computer, steals a victim's identity, and then goes on a buying spree. 

Each day brings news of more viruses, Trojan horses, and worms that can obtain your confidential information and wreak havoc on you and your computer. 

Problem – Windows often stores unneeded traces of your personal information, including passwords, credit card numbers, and previously deleted data and e-mail, all without you even knowing it.

Solution – SecureClean isolates and cleans hard drives of this unneeded information, making it impossible for cyber-criminals to steal your data. Don't just rely on your firewall and anti-virus to protect you. Make SecureClean 4.0 your second line of defense. What isn't there can't be stolen! 

SecureClean was Specifically Created to Help You:
  • Clean hard drive data to improve system performance.
  • Safely and reliably reclaim wasted disk space.
  • Completely and permanently clean hard drives of past web surfing history.
  • Clean hard drives of unneeded traces of personal information.
  • Protect you and your family from identity theft.
spacer

Read More...>>




Terminus 6

spacer

TBJ Rating:

 
Shareware  

Updated: 05/10/2005


The crown jewel of EFW's software product line and our longest-running development project (going on its seventh year!), Terminus 6, is the ultimate data-destruction toolkit. Compliant with just about every known standard and easily made compliant with any standard that exists, Terminus 6 packs the power professional IT Security personnel need with an ease of use that makes it perfect for the home computer user. Make sure your sensitive but no longer needed data is well and truly gone, and above all, Leave No Traces.

Terminus 6 - the ONLY data destruction toolkit with...
... support for a thousand or more overwrite passes;
... Digital Thermite, for rapid destruction in the event of a physical security breach;
... total network support;
... surgical data destruction that can zap a specific word anywhere it occurs.
spacer

Read More...>>


space
Translate Page!
Espa˝olFranšaisDeutschNederlands


 

 

 

 

Newsletter

Sign-Up for The Business Junction Newsletter and Get "FREE" Newsletter Sign-Up Software, Specials Updates, Product Updates and MUCH MORE!


 

| Home | AdvertiseAffiliates | Contact Us | Contents | Disclaimer & Terms Of Use |

Free Bonus Gifts | Free Software | Hot Software | JV Giveaways | Link Partners |

Link To Us | Newsletter | Newsletter Articles (The Best From Our Archives) |

Privacy Policy | Site of the Week | Software Directory | Software Spotlights | Special Offers | Turnkey Web Sites |

The World's Largest Digital Package!
SUPER COMBO PACKAGE
(16,090+ Products & Getting Bigger Daily)

Our Other Premium Packages!
EXTREME Niche Combo Package (8,585+ Products)
Private Label Rights Package (3,230+ Products)
Graphics & Web Design Package (3,915+ Products)
Internet Marketing Package (2,615+ Products)
Sports, Leisure, and Health Package (2,540+ Products)
Social Media Marketing & SEO Package (1,265+ Products)
Affiliate Marketing Package (825+ Products)
Blog, Podcasting, & RSS Package (745+ Products)
Article Marketing Package (260+ Products)
Auction Marketing Package (210+ Products)
Joint Venture Marketing Package (65+ Products)
Pop-Ups Package (35+ Products)

Copyright 1996 - 2015 TheBusinessJunction.Com

Protected by Copyscape Plagiarism Finder
(All Rights Reserved: No material from this site may be copied for use on another site or
used for any commercial purpose without prior written permission. Violators will be prosecuted!)

The Business Junction does not offer technical assistance with any software sold from our website. All software comes with its own instructions, help and/or 
installation files. Note that most software is designed for Windows platform. If it does not specifically state that it is compatible with Mac platform, do not purchase.