Search: Home Bugtraq Vulnerabilities Mailing Lists Security Jobs Tools
(Page 1 of 4)   1 2 3 4  Next >

Category: Secure Deletion

East-Tec Eraser 2006
Added 2006-03-16
by EAST Technologies
Keep what you do on your computer to yourself! Protect your data and privacy and remove all evidence of your computer and online activity with East-Tec Eraser 2006. The product goes beyond U.S. Department of Defense standards for the permanent erasure of digital information and easily removes every trace of sensitive data from your computer: Internet history, Web pages, pictures, unwanted cookies, chatroom conversations and all traces of files, confidential documents or mails deleted in the past.

HiddenFinder
Added 2005-11-02
by Wenpoint Corp.
HiddenFinder is an advanced security tool, which allows you to detect hidden malicious code, like spyware, worm, virus and rootkit. The malicious code is usually hidden from detection. This utility digs out the hidden malicious code through detecting the hidden process and drivers in OS kernel. You can easily find the hidden malicious code through the summary of the processes and drivers.

DiskInternals Uneraser
Added 2004-10-08
by Alexey Babenko
DiskInternals Uneraser can recover any deleted file, including documents, photos, mp3 and zip files, or even folders and damaged disks. In addition to HDD, the program supports any type of storage media (music sticks, cameras, flash drives, USB drives, etc)! It works with encrypted files and helps you undelete file lost because of a virus attack or an employee's malicious behavior. No special skills needed; 100% free to try.

Mutilate File Wiper
Added 2004-08-26
by Craig Christensen, craigchr@home.com
Delete your sensitive files permanently. Mutilate File Wiper prevents recovery of deleted files from your hard drive by data recovery or forensic software. Choose one of three security levels or configure a customizable level for up to 297 overwrite passes. Mutilate supports complete folder shredding including subfolders. With Mutilate's disk free space wiper, you can even use Mutilate to permanently erase previously deleted files on your hard drive.

Darik's Boot and Nuke
Added 2004-03-24
by Darik Horn
Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

Wipe
Added 2004-01-11
by linux
Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent recover the last two or three layers of data written to disk. Wipe repeadetly overwrites special patterns to the files to be destroyed, using the fsync() call and/or the O_SYNC bit to force disk access.

East-Tec Eraser
Added 2003-09-17
by EAST Technologies, eraser@east-tec.com
East-Tec Eraser ("Eraser" in short) is a security application for Windows 95/98/Me/NT/2000/XP designed to help you completely eliminate sensitive data from your computer and protect your computer and Internet privacy. Eraser introduces a new meaning for the verb TO ERASE. Erasing a file now means wiping its contents beyond recovery, scrambling its name and dates and finally removing it from disk. When you want to get rid of sensitive files or folders beyond recovery, add them to the Eraser list of doomed files and ask Eraser to do the job. Eraser offers tight integration with the Windows shell, so you can drag files and folders from Explorer and drop them in Eraser, or you can erase them directly from Explorer by selecting Erase beyond recovery from the context menu.

Eraser
Added 2003-06-16
by Sami Tolvanen, eraser@tolvanen.com
Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.

NoTrax
Added 2003-06-03
by Heidi Computers Ltd
Are You Concerned? - that browsing the Internet has left traces of sites you've visited, all over your hard drive i.e. in the Registry, Cache etc. - that a website you are browsing may install Spyware or Viruses on your PC? - that your Credit Card details are being tracked by your browser while purchasing online? - that eliminator-type programs have not really cleaned your Registry properly? - that your laptop is lost or stolen with all the sensitive information still stored in the history and cache of your browser? - that unauthorised personnel may take a look at your PC, while you were not around? Or that Hackers are probing your PC? - that a company or individual is interested in tracking your online habits for marketing or other more dangerous purposes? - NoTrax PREVENTS this.

BCWipe
Added 2003-05-30
by Jetico, Inc.
The BCWipe utility is designed to securely delete files from the disk. Standard file deletion leaves the contents of the "deleted" file on your disk. Unless it has been overwritten by files subsequently saved, it can be recovered using standard disk utilities. Working quickly and integrated with Windows Shell, BCWipe shreds data in files so that they can not be recovered by any means. BCWipe software is a freeware for non-commercial and non-governmental use. Please, refer to BCWipe End-User license agreement for more information on licensing terms.

Search Tools
Keyword:
Platform:
Category:
Browse by category
Auditing
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Sniffers
Recovery
Passwords
Utilities
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
Authentication
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Replacement
Libraries, Applications
Programming
Libraries
Cryptography
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Rootkits
Secure Deletion
Hardening
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox







 

Privacy Statement
Copyright 2005, SecurityFocus