Software Index
Windows Software Security Tools File Removers  

Data Destroyer

primary download primary download secondary download secondary download home home report broken
important software information
company name:
Hermetic Systems
license: Shareware
minimum requirements:
functional limitations: In trial version 'Wipe disk' works only for disks in Drive A, and purge of files in multiple folders works only for disks in Drive A.
Data Destroyer description
When Windows 'deletes' a file it does not actually destroy the contents of the file but rather simply unlinks the file from the file directory system, leaving the contents of the file in the disk sectors. This data will remain there until the operating system uses those sectors when writing new data. Until the old data is overwritten (and this may take months or longer) it can be recovered by programs that read disk sectors directly, such as forensic software (so called because it is used to obtain evidence in criminal investigations and also in legal discovery).

In order to be sure that a deleted file really is deleted, gone for good, its contents never to be seen again, it is necessary to overwrite the data sectors of that file. Data Destroyer purges data in files, where 'purge' means to destroy, to eliminate completely by overwriting, so that the data cannot be recovered by any means. Data Destroyer allows you to destroy the contents of a file by overwriting it several times (or many times) with random bytes, and with bytes with alternating bit patterns, before the file is deleted (i.e., unlinked).

Data Destroyer can purge either: (a) a single file, (b) all files in a folder, (c) a specified subset of files in a folder, (d) all files in a folder and all files in all subfolders of that folder, (e) a specified subset of all files in a folder and in all subfolders of that folder, (f) all space on a disk and (g) all unused clusters on a disk.

This software checks for possible errors in user input, and is designed to minimize the chance of accidentally purging a file that you wish to keep.

Another feature of Data Destroyer is that you can get an accurate estimate of the time required to perform a purge operation. A lengthy purge operation may require several hours, or even days, and if you did not have an accurate estimate of the time needed before beginning the operation you might get worried, not knowing how long it still has to run.
Similar software
Data Destroyer (Hermetic Systems) (Popularity: ) : A program for secure file deletion which destroys (or purges, by overwriting) data in files on floppy, ZIP or hard disk so that the data cannot be recovered, a process also known as 'sanitization'. A single file can be purged ...
1-abc.net File Washer (Popularity: ) : By deleting files/folders/drives with this program you can switch between 11 different erasing methods, and all of them overwrite your old file and rename it before removing so the only thing that could ever be recovered with an undeleting tool ...
ProtectStar Data Shredder (Popularity: ) : The new ProtectStar Data Shredder 2.0 ushers in an intelligent generation of solutions for secure deletion of sensitive data. This compact and user friendly software was designed with the data deletion needs of both business and private users, and allows ...
ProtectStar Data Shredder 3 Professional (Popularity: ) : Secure Erase: ProtectStar Data Shredder 3 Professional is a state-of-the-art and professional tool that has won numerous awards and that allows for secure deletion of data from hard drives and external data storage devices. This user-friendly solution, which runs under ...
Secure Disk Pro (Popularity: ) : Secure Disk Pro completely eliminates all hidden evidence of activites on your computer. It can clean your browser's cache, cookies, web forms data, entries in your recent documents history, recent applications history, find files history, your temporary files, recycle bin, ...
Terminus 2K2 (Popularity: ) : Terminus 2K2 (5.0 PR2) - Leave No Traces. The award-winning government-grade data destruction suite returns in its 5th major release. Professional power for the masses - written specifically to fit the needs of IT security professionals, while being easy for ...
FastWiper (Popularity: ) : Delete does not mean erase. "Previously deleted" files can be easily recovered. Use FastWiper to prevent file recovery and remove sensitive data such as tax returns, financial statements, passwords, health records, email and all evidence of your online activity.
WipeDrive (Popularity: ) : Wipe your hard drive completely clean. Use WipeDrive to wipe all data from your computer and start fresh with a clean hard drive. Deleting a file or formatting your hard drive will not erase sensitive data. Prevent identity theft with ...
ShredIt for Windows (Popularity: ) : Files can be recovered from your computer's recycle bin. Protect your privacy with this easy to use file shredder that shreds data so it can't be recovered. Whether you want to erase a hard drive or wipe a file, ShredIt ...
abylon SHREDDER (Popularity: ) : The working with the computer and the browsing in the internet leave numerous digital traces on the disk. The normal functions of the operating system don't delete these traces completely. Special software can recover the data. With their assistance also ...
Hermetic Word Frequency Counter (Popularity: ) : This software scans a file and counts the number of occurrences of the different words. The words which are found and displayed can be ordered alphabetically or by frequency. The program can be told to allow or disallow words with ...
Hermetic Word Frequency Counter Advanced Version (Popularity: ) : This software scans a text file, multiple files or text on the clipboard, and counts the number of occurrences of the different words. The words which are found and displayed can be ordered alphabetically or by frequency. The program can ...
User reviews

Write a review:
1 2 3 4 5 6 7 8 9 10
1=poor 10=excellent
Write review*
Your name*
Email*
  (Comments are moderated, and will not appear on this site until the editor has approved them)
 
Similar scripts
Flash Data Table Effect Creator (Popularity: ) : Do you want to use loading data from database into flash table?
Do you want to use customized dynamic flash tables?
Do you want to use customized cells in flash tables?
Do you want to use customized effect on talbe cells?

It is a ...

ElegantJ Data Trees: Java Bean Component (Popularity: ) : For hierarchical data representation, select ElegantJ Data Trees for dynamic data-driven tree. ElegantJ Data Trees JavaBean™ can handle large volume of data with ease with a large number of nodes and levels in the tree. In addition to in-built search ...
Web Data Grid (Popularity: ) : Web Data Grid is a component written in Javascript and must be used in a html page to show a dinamic data grid. Its most important objective is to separate the data from the way to present them into the ...
Data Generator (Popularity: ) : Ever needed custom formatted sample / test data, like, bad? Well, that's the idea of the Data Generator. It's a free, open source script written in JavaScript, PHP and MySQL that lets you quickly generate large volumes of custom data ...
php simple acces data mysql (Popularity: ) : This php script allows the automatic generation of class giving access simplified to the data. The data base must be of MySql type.
Data Access Components for MySQL (Popularity: ) : Data Access Components for MySQL (MyDAC) is a library of components that provides direct access to MySQL database servers from Delphi, Delphi for .NET, C Builder and Kylix. MyDAC can connect directly to MySQL server or work through the MySQL ...
InterBase Data Access Components (Popularity: ) : InterBase Data Access Components (IBDAC) is a library of components that provides access to InterBase, Firebird and Yaffil database servers. IBDAC uses the InterBase client directly to connect to the server. The IBDAC library is designed to help programmers develop ...
Universal Data Access Components (Popularity: ) : Universal Data Access Components (UniDAC) is a powerful library of nonvisual cross-database data access components for Delphi, Delphi for .NET, and C Builder. UniDAC offers unified approach to the databese-related applications development process. That means you can switch easily between ...
Oracle Data Access Components (Popularity: ) : Oracle Data Access Components (ODAC) is a library of components that provides native connectivity to Oracle from Delphi, Delphi for .NET, C Builder and Kylix. The ODAC library is designed to help programmers develop faster and cleaner Oracle database applications. ...
Validat Data Validation Engine (Popularity: ) : Validat is a data validation engine, developed in ColdFusion, whose purpose is to be dropped into any application and with a minimal amount of customization, perform any data validation needs for that application.

The Validat data validation engine is broken ...

Screenshot
Data Destroyer
100% Clean
Rate me
supported os's
Windows
    Windows 95
    Windows 98
    Windows Me
    Windows NT
    Windows 2000
    Windows XP
    Windows 2003
stats
downloads 130
price $35.00
version 8.07
size in Kb 1,905
popularity   
4134/1272475
user rating 5/10
our rating 5 Stars
share info
Recommend Data Destroyer
Report spyware
New Software
Popular Software
Latest Reviews