Search Software:      

 
file shred

Relevant Keywords 

  

Free Shred Downloads

 

Computer Security

Security should be a very important and concerning issue in you every day activity. No matter you are part of a company or a home user, it is very important to protect your files. Computer Security does that for you encrypting sensitive data, hiding it in innocent carriers, allowing safe transfer through encrypted self-extract package, deleting files beyond recovery and locking application from your children or " welcomed quests". Encryption is done using one of over 20 algorithms like Twofish, Cast128, Blowfish or Shaphire II. A special algorithm is used for secure erase that overwrites every bit of information with a random number of layers of data.

security computer security security software data security hide files secure delete lock application self extract package keep computers content

PlexCrypt Compression-Encryption

PlexCrypt protects documents and folders based on both asynchronous encryption based on Public-Key-Infrastructu re (PKI) and synchronous encryption based on passwords. The encryption uses secured algorithms such as AES, Blowfish, CAST, DES, ElGamal, IDEA, IES, RC4, RC6, RSA, Rijndael, Serpent Skipjack, Twofish, etc. It allows users to encrypt multiple files and folders automatically. PlexCrypt allows users to digital sign documents and folders and use that signature to verify that original document has not been maliciously or accidently altered. PlexCrypt can create self-decrypting files, which can be transfered to other users and can be decrypted without installing PlexCrypt. PlexCrypt can also shred or deletes documents securely. It supports MD5WithRSAEncryption, SHA1WithRSA/ISO9796-2, MD2WithRSAEncryption, RIPEMD160WithRSAEncryption, SHA1WithRSAEncryption, RIPEMD160WithRSAEncryption, MD5WithRSA/ISO9796-2 RIPEMD160WithRSA/ISO9796-2, RIPEMD160WithRSA/ISO9796-2 algorithms for digital signatures. PlexCrypt also allows users to archive a set of files and folders in the ZIP format and extract them later. In addition, it allows users to create and manage digital certificates and key-pairs for encryption and digital signatures.

compression encryption decryption public key infrastructure synchronous self decryption digital certificate aes blowfish cast des

DELSPECial

DELSPECial is a "DOS world can't do without" file finder-command invoker plus new deltree - 5-star rated. Invokes any program / command to do anything the invoked program / command has provision for, on any file or a particular set of files (file extension enough) located anywhere on a disk. Every command or executable, that will not attend to subdirectories on its own, can be made to be invoked on any files wherever they may be on a drive. DELSPECial puts every DOS command or executable at your disposal. All types of commands and programs can be invoked i.e. those that accept file specifications and those that accept only the full name of the file can be invoked and DOS pipe characters can also be employed where necessary using user defined substitute characters. Now the entire drive's contents are in your control even when you know only the file extensions instead of full filenames. Locates file (file extension enough). Logs to file's directory on your behalf. On next invocation, you can skip this directory and go to next level directory which has file(s) with desired extension. Versatile. You can do anything. Find and open file. Find and delete file. Lists deleted files in ListFile. Find and play, view, edit, encrypt, or shred file or do anything if you have the required player, viewer, editor, encrypter, shredder, etc., etc. Imagination and programs / commands at your disposal are the only limitations. Programmers can search for code (often their own code) by invoking a file viewer recursively across directories all over the drive. One can limit functionality to first-file-found directory if recursive directory navigation is not needed. Has runtime directory creation capability. Lesser command line params to be typed if environment variables are used. Ctrl-Break, Ctrl-C or SCROLL LOCK can be hit to stop next invocation or next file deletion if you suddenly find that you had run the wrong command.

recursive command invoker recursive command executer file finder delete utility file management finds file launches exe deletes files

Asmw PC-Optimizer pro

Asmw PC-Optimizer pro is a collection of over 30 system-maintenance and optimization utility to tune up windows performance. Remove junk files and zero size files to save valuable disk space; Registry Cleaner, to prevent application crashes;backup and restore backup; popup killer; Startup Manager, to prevent spy applications from running behind your back; erase your navigation tracks to ensure your privacy, available more than 30 ready plug-ins for erasing the history of those applications and get free plug-in maker; find and fix or remove broken windows shortcuts; Uninstaller manager, to uninstall applications correctly; Tweak and customize almost over 110 undocumented settings in Windows 9x-Xp; Disk Analysis, for analyzing your hard disk; Secure shredder, to delete files permanently; Use Internet connection Booster, to Speed up your Internet connection by up to 300%; Scan Drive(S) For zero size (empty) folders; automatic memory recovery tool; Track and report on changes made to your Folders when installing programs; Powerful disk catalog; website address organizer; address book organizer; view and remove fonts; Securely encrypt decrypt files; One-step PC Maintenance Wizard; Schedule system maintenance to take place unattended; and much more? Your computer will be stabile and run applications more smoothly. It is fast, easy, safe, and powerful. executable files and folder lock added, menu guard added, IP Spam Messages Blocker added

registry optimize boost boot font settings tweak address catalog organizer shred

Optimize Computer

Keep your PC running faster, cleaner, and error free with Optimize Computer! This award wining application is a suite of 7 powerful tools designed to increase the performance of your computer, by correcting problems, cleaning and fixing Windows registry, deleting unnecessary files, fine-tuning your internet connection settings, shredding the unwanted files like cookies, internet history and temporary files and more! Features: - Removes junk files from your hard disk - Improve the general system performance - Clean and fix Windows registry - Accelerates your internet connection - Protects your privacy and shred unwanted files - Find and fix annoying faults - Allows you to customize your system to your needs A computer can be crammed full of stuff you don't need or want, and this can slow down the performance of Windows, your hard drive and your Internet connection. This utility monitors your PC and fixes problems, giving you a smarter, better and faster computing experience. Optimize Computer is the ultimate solution for keeping your computer running like new.

optimize computer clean registry cleaner fix errors keep pc running faster

Multi-ZIP-licity

Multi-ZIP-licity is a program for people working with multiple ZIP files. Its primary function is to extract files from multiple archives and create multiple archives. Program also includes extra tools designed to encrypt and decrypt files, list contents of a folder as text, change attributes of multiple files and securely shred files.

archive multizip multiunzip zipping unzipping encryption decryption shredding security multiple zip

Advanced Encryption Plug-In for Windows Explorer

AEPE lets you encrypt/decrypt/shred/make encrypted .exe files/work with .ZIP files with using a power of standard Microsoft Windows Explorer! It integrates into Windows Explorer and allows you to work with your important files using Explorer's context menu. It is easy as 1-2-3! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CASTt. All algorithms are industrial encryption standards. Shredding (Safely removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) from your files. It allows you to send encrypted .exe files to your friends and partners. They do not need to have any software to extract important data with using password - only this sfx .exe file. Making your files smaller, AEPE compresses your data during encrypting. Your encrypted files will be on 50-500% smaller! And do not worry - you will be always able to restore original files with using your password. Ability to browse contents and extract it from ZIP archives. Ability to create own compressed ZIP archives. Using a riddle for your password inside encrypted file. You will never forgot your password! Using the power of standard Windows to work with your important files. AEPE integrates into Windows Explorer's context menu and allows you to work with your data on your computer drives with only single mouse click!

encrypt encryptor password protect blowfish extracted encrypted shred blowfish explorer desx

Advanced Encryption Plug-In Pro for Windows Explorer

AEPE lets you encrypt files using 17 encryption algorithms and also shred/make encrypted .exe files and work with .ZIP files from context menu of Windows Explorer! Encrypting files with using strong encryption algorithms: Advanced Encryption Standard (Rijndael), Blowfish, DES, CAST, RC2, Twofish, Diamond2, Mars, Gost, Tea, Safer and so on (17 algorithms). All algorithms are industrial encryption standards. Shredding (Safe removing files from your system). The shredded files will never be restored even with using Norton Unerase software. Making SFX (Self-extracting archives) from your files. It allows you to send encrypted .exe files to your friends and partners. They do not need to have any software to extract important data with using password - only this sfx .exe file. Making your files smaller, AEPE PRO compresses your data during encrypting. Your encrypted files will be on 50-500% smaller! And do not worry - you will be always able to restore original files with using your password. Ability to browse contents and extract it from ZIP archives. Ability to create own compressed ZIP archives. Using a riddle for your password inside encrypted file. You will never forgot your password! Using the power of standard Windows to work with your important files. AEPE integrates into Windows Explorer's context menu and allows you to work with your data on your computer drives with only single mouse click!

encrypt encryptor password protect blowfish extracted encrypted shred blowfish explorer desx

CryptoCrat 2004

CryptoCrat 2004 encrypts multiple files into one single solid encrypted archive using all strong encryption algorithms known today including AES!. It transforms files data into gabberish undecipherable by others. If the scrambling of the data is done properly, the original file can only be unscrambled and read by someone who knows the secret key i.e. the code used to encrypt the file. Handy interface like Windows Explorer. Secure files deletion.

encrypt encryptor password protect blowfish extracted ecnrypted shred blowfish encryptionsoftware archive

CryptoExpert 2004 Lite

CryptoExpert Lite is a free encryption software. It uses an on-the-fly encryption system to encrypt and decrypt data. Data is stored in the encrypted form, but when it is requested by any application, it gets decrypted on-the-fly. Conversely, unencrypted data to be stored is encrypted instantaneously and then stored. The CryptoExpert system mounts a volume file to create a "virtual drive" that appears to applications and users like any other physical drive. Any data that the user attempts to write to this drive is intercepted by CryptoExpert, encrypted, and written to the volume file. Attempts to read from this volume are also intercepted, and the relevant data is read by CryptoExpert from the volume file, decrypted, and presented to the application trying to read the data. Dismounting the CryptoExpert "virtual drive" ensures that data cannot be read from or written to it. All data is stored encrypted within the "container". As far as windows is concerned, there is a 'new' disk that has suddenly appeared. When the program exists or the volume is unmounted, the file system stays encrypted and there is absolutely no way anyone can recover/get the data without the pass phrase.

encrypt fly password protect encryption blowfish cast disk virtual drive volume

 
Audio Software
Office & Business
Games Software
Graphics Software
Internet Software
Home Software
Developers Tools
System Utilities
 
 
 
 

Page 1 out of 4    1 2 3 4

 

Copyright 2004-2010 FilesWeb.com