Eraser 5.8
Erase data permanently. Free.
Product Specifications
User Rating: | item has less then 1 vote |
|
FileCart Rating | ||
Submitted by: | heidi151 | |
Homepage | Visit Homepage | |
License | Freeware | |
Price | $0.00 | |
Downloads | 904 | |
OS Support | Windows Install and Uninstall | |
File Name | EraserSetup.exe | |
File Size | 2.29 MB ( 2,344 KB ) | |
Published | Oct 26, 2004 (19 years ago) | |
Updated | Apr 08, 2011 (13 years ago) |
Follow Us!
Latest Searches
SmarterMail GRP Files to Office 365 For Free 34 minutes ago
Transfer PDF into Text Word 40 minutes ago
FTFrame 41 minutes ago
Import EML into Office 365 45 minutes ago
Upload PDF Image File in BMP 49 minutes ago
Open PDF in Image Photo 52 minutes ago
SmarterMail Export Mailbox into PST 55 minutes ago
MBOX Mailbox to IMAP Server 1 hour ago
Convert MBOX to PST Online 1 hour ago
Popular Searches
Database Workbench Pro 256 times
TeraByte Drive Image Backup and Restore 255 times
Elcomsoft Phone Breaker 251 times
Elcomsoft Phone Viewer 232 times
Softperfect 227 times
SAM Broadcaster Cloud 223 times
BootIt Collection 221 times
YetiShare File Hosting Script 206 times
Antamedia HotSpot Software 204 times
Product Details
Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk.
Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.
You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk.
Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.
Requirements: | Windows Common Control 4.72 |
Release Info: | Minor Update on Jan 05, 2008 |
Related Tags: | erase wipe shred overwrite destroy |
Reviews
You must be logged in to write a review
Reviews of Eraser 5.8
You can be the first to write a review of Eraser!Most Viewed Windows Secure File Deletion
Mutilate File Wiper 2.97
BlazingTools Perfect Keylogger 1.99
Active@ ERASER 4.1.0.7
ShredIt for Windows 5.4
Lastbit MD5 Password Recovery 4.0.1135
DeleteOnClick 2.4.2.0
Family Spy Software 11.9
Search and Recover 5.4.9.51
QuickBooks Key 8.0
Most Downloaded Windows Secure File Deletion
Lastbit MD5 Password Recovery 4.0.1135
BlazingTools Perfect Keylogger 1.99
Windows Password Recovery Bootdisk 5.0
Mutilate File Wiper 2.97
C-Privacy 2.3
Search and Recover 5.4.9.51
Dark Files 6.2.1.1a
Clean Disk Security 8.0
DeleteOnClick 2.4.2.0