Home | Submit a file | New | Categories | RSS Feeds | Blog
Free Software Advertising
Itís only an archive information about the software (no link to download) as we cannot download the software.
"Secure Deletions" snapshot
This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate.
A personalized faxing software can reach thousands of people with no limit. This easy to use product is your ideal communication tool for fax marketing, customer communication, event notification, newsletter publishing and more.
001 Video Converter, convert any video to iPod, iPad, PSP, iPhone, Zune, Xbox360, The best video audio converters for MP4, Flv(Flash), Avi, Divx, Xvid, H.264, Mkv, Mpg (Mpeg-1,2), Wmv, Rm, Rmvb, Mov, Vob, 3GP, OGG, ASF, WMA, WAV, MP3, AC3, AAC, etc.
23% of users liked this software
December 14, 2007
Description from the Publisher
This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate. The files will simply not exist.
The 'Secure Deletions' program can be used as a 'Recycle Bin' replacement.
Two methods of encryption are used in the overwrite procedure. The encryption that is part of the Windows operating system is used and a form of encryption known as 'AES (Rijndael) secret key encryption' is also used. The 'secret key' is a string of characters such as 'I=04Rip:}1k&>td=!@4gu9N8DW;>%}zebu' that is created and used in the encryption procedure. Titlebar software changes the secret key characters once a month. Old keys are destroyed, so, it is ultimately impossible for files that have been encrypted, using the older keys, to be decrypted.
A third method used, in the overwrite procedure, overwrites data with a string of numbers such as ?22222222? or ?44444444?. There is no encryption involved- your data is simply overwritten with numbers. As a result of there being no encryption involved in this step, there is absolutely no chance of decryption... the data is simply overwritten with a string of numbers and thereby destroyed.
The user has the option of viewing the overwrite and renaming procedures as unwanted file system items are destroyed.
No spyware. No spam. No advertisements.
Users reviews & testimonials
This software is not reviewed yet.
Other downloads from this publisher
A quick and easy to use backup tool for both, beginners and advanced users. And, it is a very small program.
'File Encryptor' is a small program that encrypts and decrypts files. Requires the use of a password, of your choosing, and encrypts/decrypts files to ...
Displays the current date in a tray icon.
Tray Folder is a launcher. Start the program and an icon will appear in your tray displaying the date. Right-click on the tray icon to open your tray ...
[ More downloads from this publisher ]