Secure Deletions 2
This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate.
Product Disabled!
This product has been disabled by the site staff.Reason:
dead download link
Product Specifications
User Rating: | User Rating Disabled | |
FileCart Rating | Staff Rating Disabled | |
Submitted by: | Link Disabled | |
License | Shareware | |
Expires | 14 Days | |
Price | $5.00 | |
Downloads | 140 | |
OS Support | Windows Install and Uninstall | |
File Name | sdelete2.zip | |
File Size | 0.63 MB ( 646 KB ) | |
Published | May 23, 2007 (17 years ago) | |
Updated | Oct 07, 2013 (11 years ago) |
Latest Searches
GWB Get wooden beams 18 hours ago
Softperfect 23 hours ago
ChequePrinting.Net Software 2 days ago
2025 2 days ago
2023 2 days ago
Cut and fill volume in AutoCAD 2 days ago
Google Chrome download 2 days ago
tree size portable 2 days ago
data access components 2 days ago
Popular Searches
Database Workbench Pro 258 times
TeraByte Drive Image Backup and Restore 255 times
Elcomsoft Phone Breaker 251 times
Softperfect 233 times
Elcomsoft Phone Viewer 232 times
SAM Broadcaster Cloud 223 times
BootIt Collection 223 times
YetiShare File Hosting Script 207 times
Antamedia HotSpot Software 205 times
Product Details
This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate. The files will simply not exist.
The 'Secure Deletions' program can be used as a 'Recycle Bin' replacement.
Two methods of encryption are used in the overwrite procedure. The encryption that is part of the Windows operating system is used and a form of encryption known as "AES (Rijndael) secret key encryption" is also used. The "secret key" is a string of characters such as "I=04Rip:}1k>td=!@4gu9N8DW;>%}zebu" that is created and used in the encryption procedure. Titlebar software changes the secret key characters once a month. Old keys are destroyed, so, it is ultimately impossible for files that have been encrypted, using the older keys, to be decrypted.
A third method used, in the overwrite procedure, overwrites data with a string of numbers such as '22222222' or '44444444'. There is no encryption involved- your data is simply overwritten with numbers. As a result of there being no encryption involved in this step, there is absolutely no chance of decryption... the data is simply overwritten with a string of numbers and thereby destroyed.
The user has the option of viewing the overwrite and renaming procedures as unwanted file system items are destroyed.
No spyware. No spam. No advertisements.
The 'Secure Deletions' program can be used as a 'Recycle Bin' replacement.
Two methods of encryption are used in the overwrite procedure. The encryption that is part of the Windows operating system is used and a form of encryption known as "AES (Rijndael) secret key encryption" is also used. The "secret key" is a string of characters such as "I=04Rip:}1k>td=!@4gu9N8DW;>%}zebu" that is created and used in the encryption procedure. Titlebar software changes the secret key characters once a month. Old keys are destroyed, so, it is ultimately impossible for files that have been encrypted, using the older keys, to be decrypted.
A third method used, in the overwrite procedure, overwrites data with a string of numbers such as '22222222' or '44444444'. There is no encryption involved- your data is simply overwritten with numbers. As a result of there being no encryption involved in this step, there is absolutely no chance of decryption... the data is simply overwritten with a string of numbers and thereby destroyed.
The user has the option of viewing the overwrite and renaming procedures as unwanted file system items are destroyed.
No spyware. No spam. No advertisements.
Requirements: | Pentium 266 |
Release Info: | Minor Update on Feb 01, 2007 |
Release Notes: | Configured for new version of Framework. |
Reviews
We have disabled this product, you can not write reviews of this product
Reviews of Secure Deletions 2
You can be the first to write a review of Secure Deletions!Most Viewed Windows File Managers
SE-Explorer 1.31.1
EaseUS Partition Master Server Edition 9.1
Add PST into MS Outlook 3.1
Recover My Files Data Recovery Software 5.1.0.1872
Easy Duplicate File Finder 5.8.0.978
WinZip 21.0.22288.0
Stellar Phoenix Photo Recovery 6.0
DiskInternals CD and DVD Recovery 3.5
BKF Repair 6.0
Most Downloaded Windows File Managers
WinNc 7.7.1.0
Recover My Files Data Recovery Software 5.1.0.1872
DriveScan Bulk File Manager 1.3
DiskInternals CD and DVD Recovery 3.5
Stellar Phoenix Photo Recovery 6.0
AB Commander 7.5.5
Auslogics File Recovery 6.1.2
WinZip 21.0.22288.0
BKF Repair 6.0