(Page 4 of 4)   < Prev  1 2 3 4 

Category: Secure Deletion

Evidence Eliminator
Added 2001-10-22
by ESoft(UK), support@evidence-eliminator.com
This security tool eliminates all evidence from your PC in one single click of a button. In tests, Evidence Eliminator defeats "Forensic Analysis" software as used by investigators, law-enforcement etc.

Secure Delete 2.2
Added 2001-10-22
by van Hauser/THC, vh@reptile.rug.ac.be
Secure Delete is comprised of a set of tools that do secure removal and overwriting of files, on Unix systems. They work according to the technique proposed by Peter Gutmann at Usenix '96. The programs included will overwrite whole partitions, directory entries, and individual files.

Without A Trace
Added 2001-10-22
by software@mch1.demon.co.uk
Without A Trace (referred to as WAT) can and will destroy files/data on a computer. Therefore it is suggested as a precaution all data should be backed up before using this software to prevent the accidental deletion of vital system or personal files.

Added 2001-10-22
by Epicurus, epicurus@wilter.com
KillFile securely deletes files in Windows 95/98/NT.

Added 2001-10-22
by Eddie Bond, ebinfo@compuserve.com
Shred-X is a security file shredder. Its purpose is to prevent others from breaching your privacy or stealing your secrets by securely removing all traces of any sensitive files from your hard disk. Shred-X does this by using sophisticated overwriting algorithms which obliterate latent data on your hard disk, making your deleted files irrecoverable, even by expensive equipment. The user interface was designed with safety and ease of use as prime criteria. Multi-pass file deletion, (including the Windows SwapFile) is combined with effective disk cleaning.

SecureClean v2.1
Added 2001-10-22
by AccessData Corporation, info@accessdata.com
SecureClean completely eliminates unwanted data. SecureClean thoroughly scans your system in search of data that you specify as unwanted. The cleaning process then securely overwrites the data to the same standards developed by the US Department of Defense?eliminating all traces of the files. And to ensure the cleaning process is successful, SecureClean allows users to verify that clusters containing previously deleted files are completely clean.

Search Tools
Browse by category
Log Analysis, Host, Passwords, Network, File Integrity, PSTN, Forensics, Backdoors, Source Code
Passwords, Filesystem, Network, System, Compiler, Log Management, Usage Monitoring, Email
One Time Passwords, User Authentication, Password Management, Web, Server, Certificates, Tokens
Intrusion Detection
Network, Host, Web, Evasion
Access Control
Network, Firewall, user privileges, RPC, Bootup, File System, Applications, Mandatory Access Control, Server, X-Windows, ACLs, Privileges
Libraries, Applications
Libraries, Random Numbers, Traffic Encryption, Data Encryption, Cryptoanalysis, Steganography, E-mail
Network Monitoring
Policy Enforcement
Web Access, Email
System Security Management
Accounts, Console, Windows NT, Firewall, Configuration, Filesystem, Linux, Solaris, Monitoring
Network Utilities
Tunneling, Miscellaneous, Monitoring
Secure Deletion
Linux, FreeBSD, NT, Solaris
Hostile Code
Detection, Removal, Sandbox


Privacy Statement
Copyright 2010, SecurityFocus