Data Destroyer 14.92

Hermetic Systems in Security & Privacy / Other

Data Destroyer screenshot

User Rating: 4.0 (1 vote)

When Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (which take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery). In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges data in files, where 'purge' means to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted. Data Destroyer can purge: a single file, all files in a folder, all files in a folder and all files in its subfolders, a specified subset of files in a folder and (optionally) in its subfolders, all files whose file dates are before a specified date, all files in selected subfolders (or in selected subfolders of a folder). It can also purge files in the Windows 7 and 8 Recycle Bin. This software checks for possible errors in user input, and is designed to minimize the chance of accidentally purging a file that you wish to keep. Another feature of Data Destroyer is that you can get an estimate of the time required to perform a purge operation.

File Size: 1.48 MB License: Shareware Price: $29.45
Platform: Win2000, Win7 x32, Win7 x64, WinServer, WinVista, WinVista x64, WinXP
Downloads: Total: 50 | This Month: 2 Released: 2014-04-29
Data Destroyer Similar Software

Data Digester 1.6.7 Build 895 Leisenfels UG    

The Data Digester software is the fully integrated solution for ... and many more. The advantages of the Data Digester software at a glance: Create checksum ... files for errors and manipulation at anytime Secure data exchange with customers and inhouse Save time by using a comfortable and fully integrated .... Free download of Data Digester 1.6.7 Build 895

Data Digester for Mac 1.6.7 Build 895 Leisenfels UG    

The Data Digester software for Mac is the fully integrated ... and many more. The advantages of the Data Digester software at a glance: Create checksum ... files for errors and manipulation at anytime Secure data exchange with customers and inhouse Save time by using a comfortable and fully integrated .... Free download of Data Digester for Mac 1.6.7 Build 895

Data Digester for Linux 1.6.7 Build 895 Leisenfels UG    

The Data Digester software for Linux is the fully integrated ... and many more. The advantages of the Data Digester software at a glance: Create checksum ... files for errors and manipulation at anytime Secure data exchange with customers and inhouse Save time by using a comfortable and fully integrated .... Free download of Data Digester for Linux 1.6.7 Build 895

G DATA InternetSecurity For Android 2015 G DATA Software AG    

G DATA INTERNET SECURITY FOR ANDROID offers comprehensive protection against ... go for Android smartphones or tablets. G DATA INTERNET SECURITY FOR ANDROID™ offers comprehensive protection against ... and lock them down with a password. All data, messages and call lists of these contacts are ... Protect yourself from virus 'spray guns' and data thieves with effective surfing and phishing protection Protect .... Free download of G DATA InternetSecurity For Android 2015

software pick   

Cyberoam EndPoint Data Protection Suite 3.21.0723 Elitecore Technologies Limited    

Cyberoam Endpoint Data Protection protects the organization's endpoints from data leakage through Identity and group-based policy controls, encryption, shadow copies, logging, reporting and archiving. Cyberoam offers data protection and asset management in four easy-to-deploy and use modules - Data Protection and Encryption, Device Management, Application Control and ... to trusted devices, applications and recipients while sharing data. Asset Management eliminates the IT burden on organizations .... Free download of Cyberoam EndPoint Data Protection Suite 3.21.0723

software pick   
Popular Software in Security & Privacy / Other

Kaspersky Tablet Security 11.5.0590 Kaspersky Labs    

You vigilantly protect PC – you should also do the same with your tablet. Free download of Kaspersky Tablet Security 11.5.0590

software pick   

ZoneAlarm Security Suite 2010 9.3.037.000 Zonelabs    

Essential antivirus, anti-spyware, and firewall protection for your PC. Free download of ZoneAlarm Security Suite 2010 9.3.037.000

software pick   

Privacy Eraser Portable 3.0.5 Cybertron Software Co., Ltd.     update

Clean up all your Internet history and past computer activities with one click.. Free download of Privacy Eraser Portable 3.0.5

SafeIP 2.0.0.2496 SafeIP    

Protect your online identity and unblock websites with free anonymous surfing.. Free download of SafeIP 2.0.0.2496

Disk Cleaner 1.8.1795 Sourceforge    

Clean up temporary files fast and easy. Free download of Disk Cleaner 1.8.1795

software pick