A program for secure file deletion which destroys (by overwriting) data in multiple files and multiple folders so that the data cannot be recovered. Single-file or batch-mode operation. Can delete 'old' files.
Jun 12, 2013 15:26:59
Windows 98, Windows 2000, Windows XP, Windows Vista
Five Cellular Automata 9.00 Software for exploring five cellular automata: q-state Life (a generalization of Conway's Life), the Belousov-Zhabotinsky Reaction, Togetherness, Viral Replication and Diffusion-Limited Aggregation.
Description: When Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (which take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery).
In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges data in files, where 'purge' means to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted.
Data Destroyer can purge: a single file, all files in a folder, all files in a folder and all files in its subfolders, a specified subset of files in a folder and (optionally) in its subfolders, all files whose file dates are before a specified date, all files in selected subfolders (or in selected subfolders of a folder).
This software checks for possible errors in user input, and is designed to minimize the chance of accidentally purging a file that you wish to keep. Another feature of Data Destroyer is that you can get an estimate of the time required to perform a purge operation.
VOIP's Cry: More Secure Data Nets Security experts claim enterprise voice-over-IP systems can be made secure, but companies must first take basic steps to secure their data networks.
Now on DVD: The Sanitizer's Cut Ray Lines is one of the most prolific film editors working today. Thousands of movie fans have seen his handiwork on some of Hollywood's most successful films, from big-budget blockbusters like "Saving Private Ryan" to smaller works like "Sideways." By hi