Home | Submit a file | New | Categories | Our awards | Link to us
February 13, 2006
Description from the Publisher
By deleting files/folders/drives with this program you can switch between 9 different erasing methods, and all of them overwrite your old file and rename it before removing so the only thing that could ever be recovered with an undeleting tool will be senseless data. As a special feature you can overwrite files you want to delete with another file too, so whenever someone tries to reverse the wiping, he only gets the things you want him recover.
1-abc.net File Washer 3.01
Most popular product from this categoryADScribe
Active Directory reporting tool that creates technical report of Active Directory infrastructure resources. It supports: rich set of documentation styles and output formats (HTML, CHM, MS Word Document), wizard and command line interfaces.
AQL Secure Password Generator
AQL Secure Password Generator( http://www.aqlsoft.com ) allows you to create random password that are highly secure and extremely difficult to crack or guess due to an optional combination of lower or upper case letters,numbers and punctuation symbols
Max PC Secure
Max PC Secure provides the user a total secure and private Internet experience. Max PC Secure is an integrated solution for adware / spyware removal, anonymous surfing, privacy & data protection and popup killer to improve your computer performance.
Screen Anytime is a set of software recording onscreen computer operations into video log files for surveillance purpose.it provides a continuous, stable and long-term keeping solution for screen logging.
Webm8 Portable Edition
Carry your passwords on your key ring.
SpyPal AIM/AOL Messenger Spy 2008
Secretly record all AIM/AOL Messenger chats.
The Browser Defender toolbar allows you to surf safely by displaying site ratings as you browse the Internet.
TrafficRefine: A personal network filter used to restrict access to particular Internet resources from a local computer. It was developed with parental control in mind and combines necessary functionality with extreme ease of use.
10-Strike Connection Monitor
Find out who opens your files over network. The program generates screen, sound, and e-mail notifications on connections to your shared folders. It writes a log file with information on remote user name, files and folders viewed, date, type of access
The Easy CRYPT- und ZIP-Solution provide a simple way for signing, encrypting and compressing of files. The encryption with the AES- or Blowfish-Algorithm supports the password based SYMM-System and the certificate based HYBRID-System (PKCS).