When Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (which take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery).
In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges data in files, where 'purge' means to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted.
Data Destroyer can purge: a single file, all files in a folder, all files in a folder and all files in its subfolders, a specified subset of files in a folder and (optionally) in its subfolders, all files whose file dates are before a specified date, all files in selected subfolders (or in selected subfolders of a folder). It can also purge files in the Windows 7 and 8 Recycle Bin.
This software checks for possible errors in user input, and is designed to minimize the chance of accidentally purging a file that you wish to keep. Another feature of Data Destroyer is that you can get an estimate of the time required to perform a purge operation.
What is new in this release:
Version 15.12 may include unspecified updates, enhancements, or bug fixes.
Other Windows Software of Developer «Hermetic Systems»:
HTML Table Creator Tool This program is an interactive TABLE generator which handles COLSPAN and ROWSPAN, thus enabling creation of complex tables with cells larger than 1x1. Cell specifications can include cell content, font name, font size, color, alignment, etc. A cell speci
Duplicate Text Finder Duplicate Text Finder is for comparing two sets of text files to find files in one set which are either exact duplicates of files in the other set or nearly exact duplicates (if an initial segment of text is passed over).Limitations:10-file limit
Equinoxes, Solstices and Cross-Quarter Days Software to calculate accurate dates and times for equinoxes, solstices and the Celtic cross-quarter days. The cross-quarter days are those midway between the equinoxes and solstices. For example, Imbolc is midway between the northern winter solstice and
Factorizer Factorizer is a Windows program to find factors of numbers up to 2,147,483,646 and to find primes, pairs of primes and Palmen colors of numbers. Or in more detail, Factorizer may be used: (1) to get the prime decomposition of all numbers in a range of numb
Heliocentric Planetary Aspects and Transits A Windows program to calculate heliocentric aspects between planets at a given date. Also displays personal heliocentric transits for a given birthdate, and synastry for two birthdates. Has graphical and dynamical displays which show how heliocentric tran
Keywords Meta Tag Generator Advanced In contrast to freeware keywords meta tag generators, which require *you* to select keywords, this program scans an HTML document, counting the number of occurrences of words and how they are used, and produces an appropriate keywords meta tag for the docu
Index Files Search Words This software is for indexing and searching HTML files, XML files, text files or files of a similar kind (such as XML files) in the root folder or any subfolder of a hard disk, CD-ROM.
This program does not simply create a list of files or simply searc
Stego PNG Stego PNG is a simple steganography program which allows you to encrypt and hide a file in a PNG or BMP image file, with the use of a stego/encryption key, so that the presence of the hidden file is undetectable, even by forensic software using statistica
World Dual Petin-Meton Calendar Date Conversion Software The World Dual Petin-Meton Calendar consists of two calendars: The Lunar Petin-Meton Calendar and the Solar Petin-Gregorian Calendar.The Lunar Petin-Meton Calendar, which was invented in 2001-2002 by Mikhail Petin, is based on the Metonic cycle. Months are
Keywords Meta Tag Generator In contrast to freeware keywords meta tag generators, which require *you* to select keywords, this program scans an HTML or PHP file, counting the number of occurrences of words and how they are used, and produces an appropriate keywords meta tag for the d
Safetized Someone could be secretly watching you or your child through your webcam right now. Is it worth the risk?
1) Safetized prevents sexual predators, pedophiles and hackers from remotely controlling your webcam and watching you without your knowledge.
Sir AdGuard Sir AdGuard immunizes your system from thousands of adsites, tracking cookies, spyware, Active-X controls, Browser Helper Objects, and other threats by applying our weekly-updated threat database to your Internet settings. Block nearly 90% of all Web adver
EtherBoss MSN Monitor, MSN Sniffer EtherBoss MSN Conversation Monitor & Sniffer is a handy network utility for capturing and logging MSN Messenger chats on a network. All intercepted messages will be saved to disk automatically. The program also provides a rich-features report and a finding
Zer0 Zer0 is a user friendly file deletion tool with a high level of security. With Zer0, you'll be able to delete files and to prevent file recovery by a 3rd person. So far, no user reported an efficient method to recover a file deleted by Zer0.What is new in
Web Rubber Web Rubber protects your privacy in 24 ways. Private companies are tracking ISPs to record your Internet behavior and downloads for evidence. Simply deleting these files does not get rid of the evidence. Web Rubber cleans traces of your online activities,
Max File Shredder Max File Shredder is privacy protection software that protects your privacy by completely shredding the files you specify, beyond recovery. It destroys files and folders, frees hard drive space and shreds your recycle bin contents instead of only deleting
IE Privacy Cleaner From the developer: "IE Privacy Cleaner can delete Cookies(include cookies manager), clear Cache,delete index.dat, clear Typed URLs(URLs Keeper), History, IE Media, Windows Media playlist, AutoComplete password, Downloaded Program files. delete and clear
Face Unlock Face Unlock is a desktop lock software. It will lock your desktop and only unlocked if your face recognize and detected.
With strict face recognizing algorithm that ensure your PC and data perfectly protected.
Face Unlock need web camera, or video camer
Privacy Internet Eraser Privacy Internet Eraser is a comprehensive Privacy Eraser and History Cleaner Program for most popular browsers, such as Internet Explorer, Opera, AOL, and Netscape. You will be able to manage and delete cookies, picture snapshots, URLs typed, temporary fi
ECS Safe Lock ECS Safe Lock is a handy utility that you can use to create a protected environment and put inside it all the files and folders you want to have secured. The privacy of your documents is ensured at all times, as soon as you press 'Lock' in the vault's main
Supported Operating Systems:
Windows 98 |
Comments on Data Destroyer:
Comments not found
Windows Software - Free Windows Downloads, Apps, Games, Freeware, Skype, Media Player, Antivirus, Gimp, Live, Starter for Windows XP, Vista, 7, 8, 10