Search N5 Net Software Repository:
Search Files
Sponsor:
Browse:
- Audio & Multimedia (1643)
- Business (3971)
- Communications (1197)
- Desktop (222)
- Development (607)
- Education (291)
- Games & Entertainment (731)
- Graphic Apps (698)
- Home & Hobby (108)
- Network & Internet (593)
- Security & Privacy (536)
- Servers (69)
- System Utilities (31267)
- Web Development (297)
Areas Of Interest
Authors Area
Are you a software author? Take a look at our Author Resource Center where you will find marketing tools, software specifically created for promoting your software and a ton of other helpful resources.
Digital Security Suite 2011
Get Digital Security Suite. This package contains both the Digital Document Shredder and the Digital Document Encryptor in one complete suite. Windows 7, Vista and XP certified and awarded software suitable for both the enterprise and private user. Encrypt sensitive documents and other private digital information you have on your computer. Product reknowned for it's user-friendliness. Supports up to 480 bit strong encryption. Ideal for encrypting attachements to be sent by email. The software also allows you to permanently remove selected information on your hard drive and other memories. When you delete a file, empty your Recycle Bin or even format your hard disk, the information is NOT removed from your computer. These commands only alter the structure of the drive, leaving most of the data intact and recoverable with software tools easily available. This means that someone else can recreate the files that you think you have already deleted. The only true way to permanently remove unwanted files and data is to use file shredding software. File shredding utilizes an advanced algorithm technique of overwriting your files multiple times so that the information contained in them is no longer readable, thus destroying the original data forever. The following standards and technologies are currently supported: AES-standard Rijndael, 256 bits Blowfish, 448 bits Twofish, 256 bits SafeIT-algorithm, 480 bits Hash-algorithm: MD5 HMG Infosec Standard 5, Baseline & Enhanced Peter Gutmann's algorithm U.S.Department of Defense Sanitizing (DOD 5220.22-M) Bruce Schneier's algorithm. Navy Staff Office Publication (NAVSO P-5239-26) for RLL The National Computer Security Center (NCSC-TG-025) Air Force System Security Instruction 5020 US Army AR380-19 German Standard VSITROPNAVINST 5239.1A
Specifications:
Version: 2011 |
Download
|
Similar Products:
System Utilities :: Automation Tools
Replace, insert, delete, copy, move, format, extract, convert, encode, encrypt text and bytes in multiple files. Process 1000s files using multiple CPU cores in manual, automatic/continuous, triggered/scheduled, or console modes, or directly from Windows Explorer right-click menu. Save files with original or new name defined by a mask. Select files for processing based on their name, dates, size, and contents using advanced file search.
Windows | Shareware
Read More
System Utilities :: Backup & Restore
Data doctor file recovery free download software for pen drive provides restoration process for lost and damaged pictures, audios, text documents, images, photos and other required corrupted files from digital pen drive storage. Free download restoration pen drive software supports recovery facility for deleted files even data lost due to some virus or despoiled USB storage device. Data recovery software provides recovery solution for lost data.
Windows | Shareware
Read More
Security & Privacy :: Other
Privacy Eraser is an all-in-one privacy suite, PC optimization and cleaning tool. It cleans all of your internet history traces and past activities with one click, recovers hard drive space by deleting unnecessary and redundant files, speeds up internet surfing and browsing, boosts your PC's performance and stability making it faster, secure and more efficient.
Windows | Freeware
Read More
Security & Privacy :: Other
The deletion of files with the windows recycle bin removes only the references to the files, without real clearing. In contrast to this the software abylon SHREDDER overwrite the data up to 35 times (Peter Gutman method). Afterwards the data can not be reconstructed any longer. The same goes for free space, clustertips, surf traces of the browser, file names, duplicate files or full drives.
Windows | Shareware
Read More