(Page 3 of 4)   < Prev  1 2 3 4  Next >

Category: Secure Deletion

Added 2002-03-05
by Dan Mares
NTWIPE is designed to be run strictly under the NT operating system. It is designed to wipe (overwrite) a physical disk that is visible to the NT operating system. It will overwrite the entire physical disk as many times as the user requests. It will wipe zip and Jazz disks and can do multiple drives at the same time

Added 2002-02-26
by Tom Vier, thomassr@erols.com
ya-wipe is a tool that effectively degauses the surface of a hard disk, making it virtually impossible to retrieve the data that was stored on it. This tool is designed to make sure sensitive data is completely erased from magnetic media.

Added 2002-01-18
by horsburgh
FileManager is a secure (SSL), multi-user, and web- based program for file, directory, and remote command management. It is written in Perl, for Linux and Unix-like operating systems. It displays full directory information; allows file viewing, deleting, renaming, uploading, downloading, etc.; assists in directory navigation; and can execute any command for which the user account has privilege. FileManager also comes with a built-in text editor for quick editing and file updates.

Added 2001-10-22
by CyberScrub LLC
CyberScrub removes every trace of your activity from your PC, including files, email messages and web browser tracks. CyberScrub completely destroys any data from previously deleted files that might still be accessible on your disk. Deleting an item does not remove it from your hard drive, it simply removes it from view. Designed to prevent any data being recoverable via hardware or software recovery tools, CyberScrub exceeds standards set by the US Department of Defence for the permanent removal of digital information.

Added 2001-10-22
by Matthias Rosenkranz
grind overwrites the given files with certain byte patterns in order to make it impossible to recover them from magnetic disks. It's based on a paper by Peter Gutmann, available at: http://rootprompt.org/article.php3?article=473 . It's useful for securely deleting sensitive data. This program is beta quality, so use it at your own risk.

Added 2001-10-22
by Len Budney, lbudney@pobox.com
fwipe overwrites your file a specified number of times (default: 5) and then deletes it. It is extremely secure; it will not be confused by filenames containing special characters, and is suitable for use in cleanup scripts by system admins.

Added 2001-10-22
by elleron
srm (secure rm) is a command-line compatible rm(1) which destroys file contents before unlinking. The goal is to provide drop in security for users who wish to prevent command line recovery of deleted information, even if the machine is compromised.

Interscope BlackBox
Added 2001-10-22
by Interscope
A modular, extensible and easy-to-use security suite, smoothly integrated into the Windows 95/98/NT4/2000 shell that provides users with the ability to encrypt, decrypt and safely delete (destroy) files. Uses 56-bit DES by default but other algorithms (e.g. Blowfish, RC4) are available from the BlackBox site. It can also create self-extracting encrypted archives that you can easily distribute or send over unsafe networks, such as the Internet. It was designed to fulfill the needs of everyday security while being as fast and easy to use as possible.

Added 2001-10-22
by antirez, antirez@invece.org
Overwrite is a UNIX utility for secure deletion. It's based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was created in order to make harder the data recovery process. It implements a built-in cryptographic prng and try to flush the SO and HD cache when possible. Changes: block and char device overwriting, *BSD and Solaris support, some minor bugfixes, and documentation updates.

Evidence Eliminator
Added 2001-10-22
by Esoft
This security tool eliminates all evidence from your PC in one single click of a button. In tests, Evidence Eliminator defeats "Forensic Analysis" software as used by investigators, law-enforcement etc.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus