Secure Deletions 2

This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate.

Product Disabled!

This product has been disabled by the site staff.
Reason:
dead download link

Product Specifications

Product Disabled
User Rating: User Rating Disabled
FileCart Rating Staff Rating Disabled
Submitted by: Link Disabled
License Shareware
Expires 14 Days
Price $5.00
Downloads 140
OS Support Windows Install and Uninstall
File Name sdelete2.zip
File Size 0.63 MB ( 646 KB )
Published May 23, 2007 (17 years ago)
Updated Oct 07, 2013 (11 years ago)

Latest Searches

mcafee stinger portable 7 hours ago
GWB Get wooden beams 18 hours ago
Softperfect 23 hours ago
ChequePrinting.Net Software 2 days ago
2025 2 days ago
2023 2 days ago
Cut and fill volume in AutoCAD 2 days ago
Google Chrome download 2 days ago
tree size portable 2 days ago
data access components 2 days ago

Popular Searches

id cards 602 times
Database Workbench Pro 258 times
TeraByte Drive Image Backup and Restore 255 times
Elcomsoft Phone Breaker 251 times
Softperfect 233 times
Elcomsoft Phone Viewer 232 times
SAM Broadcaster Cloud 223 times
BootIt Collection 223 times
YetiShare File Hosting Script 207 times
Antamedia HotSpot Software 205 times

Product Details

This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate. The files will simply not exist.

The 'Secure Deletions' program can be used as a 'Recycle Bin' replacement.

Two methods of encryption are used in the overwrite procedure. The encryption that is part of the Windows operating system is used and a form of encryption known as "AES (Rijndael) secret key encryption" is also used. The "secret key" is a string of characters such as "I=04Rip:}1k>td=!@4gu9N8DW;>%}zebu" that is created and used in the encryption procedure. Titlebar software changes the secret key characters once a month. Old keys are destroyed, so, it is ultimately impossible for files that have been encrypted, using the older keys, to be decrypted.

A third method used, in the overwrite procedure, overwrites data with a string of numbers such as '22222222' or '44444444'. There is no encryption involved- your data is simply overwritten with numbers. As a result of there being no encryption involved in this step, there is absolutely no chance of decryption... the data is simply overwritten with a string of numbers and thereby destroyed.

The user has the option of viewing the overwrite and renaming procedures as unwanted file system items are destroyed.

No spyware. No spam. No advertisements.

Requirements: Pentium 266
Release Info: Minor Update on Feb 01, 2007
Release Notes: Configured for new version of Framework.

Reviews

We have disabled this product, you can not write reviews of this product

Reviews of Secure Deletions 2

You can be the first to write a review of Secure Deletions!