Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Jihosoft Free Eraser 2.0
Security & Privacy :: Encryption Tools
Have some sensitive information on your computer and worry about the data leakage one day? Now with Jihosoft Eraser, you can permanently remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Key Features of Jihosoft Eraser - Delete sensitive files and folders from targeted path - Shred an entire drive or partition securely - Completely erase files on the unused space and slack space on a drive - 5 advanced data erasure patterns keep your data safe How Jihosoft Eraser will Help you When you delete files and then empty the Recycle Bin, you don't actually erase the information, you just delete the reference to it so the operating system can't find it. All the data is still there and, unless it's overwritten, can be easily recovered using file recovery software. Jihosoft Eraser just help you securely remove data and make them unrecoverable anymore with 5 data erasure patterns. Flexible Data Wipe Methods Altogether there are 3 data wipe methods available for you to choose: File & folder deletion, Drive/partition deletion, and Free space deletion. You can choose the one meets your demands best. Five Advanced Data Destruction Patterns Erase your sensitive information with 5 carefully selected data destruction patterns, keep a high security of the deleted files: Low - Random, Normal - US DoD 5220.22-ME, High - German standard, Higher - US DoD 5220.22-M ECE, and Highest - Peter Gutmann standard. Easy-to-use and 100% Clean With straight forward product user interface, you can master the utility even if you are a computer beginner. It doesn't contain any malware, and will do no harm to your PC or external storage devices.
Specifications:
Version: 2.0 |
Download
|
Similar Products:
Security & Privacy :: Encryption Tools
Privacy Drive is an easy-to-use encryption software that uses Virtual Disk & On-the-fly Disk Encryption Technology to lock, hide and encrypt all kind of pictures, videos, documents, files and folders, password protects sensitive information from unauthorized access.
Windows | Shareware
Read More
ABYLON CRYPT IN THE BOX 2023.5
Security & Privacy :: Encryption Tools
The file-safe automatically encrypts all files in the CRYPT-folder without entering the password every time. The the one-time entry of the password is sufficient to access the saved files and unauthorized users can not open this. Changes in the files will be updateded in the encrypted files automatically and the file-based design enables simultaneous access to multiple authorized users.
Windows | Shareware
Read More
Security & Privacy :: Encryption Tools
Protect your data against illegal access with the abylon CRYPTDRIVE. The encrypted drives can be open with passwords, chip cards, removable media (e.g. memory stick), CD or X.509-certificate. Only with correct authentication the CRYPTDRIVE is displayed in the File Explorer as drive and the access to the encrypted data is possible. If you lose your notebook, the closed drives are invisible and secure like a safe through AES or Blowfish encryption.
Windows | Shareware
Read More
Security & Privacy :: Encryption Tools
The encrypted file clipboard abylon SHAREDDRIVE is shown in the File Explorer on the desktop level and protect your secret files. The complete integration into the Explorer environment simplify using of the software. The encryption and decryption with the AES algorithm is done for each file operation automatically in the background. The file-based structure allow the simultaneous access of several users and reduce the backup data transfer volume.
Windows | Shareware
Read More