When Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (which take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery).
In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges data in files, where 'purge' means to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted.
Data Destroyer can purge: a single file, all files in a folder, all files in a folder and all files in its subfolders, a specified subset of files in a folder and (optionally) in its subfolders, all files whose file dates are before a specified date, all files in selected subfolders (or in selected subfolders of a folder). It can also purge files in the Windows 7 and 8 Recycle Bin.
This software checks for possible errors in user input, and is designed to minimize the chance of accidentally purging a file that you wish to keep. Another feature of Data Destroyer is that you can get an estimate of the time required to perform a purge operation.
What is new in this release:
Version 15.12 may include unspecified updates, enhancements, or bug fixes.
Other Windows Software of Developer «Hermetic Systems»:
Factorizer Factorizer is a Windows program to find factors of numbers up to 2,147,483,646 and to find primes, pairs of primes and Palmen colors of numbers. Or in more detail, Factorizer may be used: (1) to get the prime decomposition of all numbers in a range of numb
Stego PNG Stego PNG is a simple steganography program which allows you to encrypt and hide a file in a PNG or BMP image file, with the use of a stego/encryption key, so that the presence of the hidden file is undetectable, even by forensic software using statistica
Chinese Calendrics A program to convert between dates in Chinese, Vietnamese and Japanese lunar calendars and dates in the Gregorian and Julian calendars, and to find lunar new year's day and leap months for any year in the Asian calendars. Can list anniversaries of lunar d
Backup Modified Files This software is for backing up files in selected folders and their subfolders. It is network-compatible.
The program can be told to back up only files which have changed since the last backup (thus saving time by not copying files unnecessarily). Prio
Prime Number Spiral The Prime Number Spiral (a.k.a. the Ulam Spiral) is constructed as follows: Consider a rectangular grid. We start with the central point and arrange the positive integers in a spiral fashion (anticlockwise). The prime numbers are then marked. There is a te
Recycle Bin Wiper A program for wiping deleted files in the Windows Recycle Bin by overwriting them repeatedly so that the data cannot be recovered. The program is simple to use, and works with all versions of Windows from Windows 98 to Windows 8. It is trilingual: Englis
Heliocentric Planetary Aspects and Transits A Windows program to calculate heliocentric aspects between planets at a given date. Also displays personal heliocentric transits for a given birthdate, and synastry for two birthdates. Has graphical and dynamical displays which show how heliocentric tran
Keywords Meta Tag Generator In contrast to freeware keywords meta tag generators, which require *you* to select keywords, this program scans an HTML or PHP file, counting the number of occurrences of words and how they are used, and produces an appropriate keywords meta tag for the d
HTML Table Creator Tool This program is an interactive TABLE generator which handles COLSPAN and ROWSPAN, thus enabling creation of complex tables with cells larger than 1x1. Cell specifications can include cell content, font name, font size, color, alignment, etc. A cell speci
Real Time Cleaner Real Time Cleaner is a privacy-protection tool that securely deletes online Internet tracks and program-activity records stored in your browser and other hidden files on your computer. It maintains your online privacy by permanently erasing all your online
O&O SafeErase Server O&O SafeErase Server is the solution for the secure deletion of sensitive data and internet tracks like your browser history or your stored cookies from your hard disk and offers you the ultimate protection of your private sphere. With just one click of th
Ultimate Security Suite Fortify your computer against all security threats without compromising your browsing experience and your PC performance. Protect your privacy and data with Ultimate Security Suite and effortlessly shield your PC from a single location. Surf the Web undete
iHide iHide is a container to any program in your computer system to its shell by means of dynamically created tabs. iHide then hides instantly the opened programs currently running on its tabs with a set of hot keys (or rather secret keys). The hidden programs
Lock and Unlock Your PC With USB Drive Software This software offers a solution to users who want to lock their computer using a USB device as a physical key instead of a password. Each USB device has a unique identity and with this software it can be used as a key. Simply insert a flash drive into the
XMicro Internet Security: Anonymous Surfing Anonymous Surfing enhances your online privacy by hiding your IP address and location from all the Websites you visit. The application changes the Internet Explorer proxy settings so that IE uses one of thousands anonymous servers (which could be anywhere
AVS Antispam Stop a flow of annoying e-mails with suspicious content with AVS Antispam. AVS Antispam uses a combination of intelligent methods to analyze content of incoming messages and detect spam among them. Select among three aggression levels to adjust filtering p
PC Activity Monitor PC Activity Monitor (PC Acme) is an ultimate invisible and undetectable easy-to-use monitoring and surveillance tool for both networked and personal PCs. It is professional software that captures all users activity on the PC. It is a powerful management to
WinClearup Utilities 2006 When you surf online, you leave behind traces of this activity. These unnecessary files take up valuable disk space and can jeopardize your privacy. WinClearup Utilities 2006 clears browsing history such as cookies, temporary Internet files, index files, r
Recover PDF Password Recover PDF Password is a PDF password recovery tool by Eltima Software, which recovers passwords for PDF files if they were lost or forgotten. It can recover both user password, which prevents opening a PDF file and owner password, which protects informat
Supported Operating Systems:
Windows 98 |
Comments on Data Destroyer:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10