Google
 
Web www.FreewareBox.com
 Advertisements

Freeware search result for 'defense'Pages : 1 2 3 . . . 8

Resort by : Name - Release date - Added date - Points - Rating - DownloadsCurrent sorting : Added data

CHAOS ShredderVer.: 2.4

categ.: >

No icon available

...Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recover...sensitive files can be recovered, even after you format your hard disk! When you delete a file from Windows, Windows just mark the file as deleted i... delete a file from Windows, Windows just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, there are many tools available which can let others easily recover your sensiti... others easily recover your sensitive files even after you have formated the hard disk. Sensitive data can easily fall into the wrong hands. And because Windows is not capable of deleting information beyond recovery, you are at risk! Passwords, financial documents, even those "about last night" e-mails are fair game for the IT professionals, computer technicians or hackers. CHAOS Shredder allows you to purge, wi...

Download size: 287 kBytes

EraserVer.: 5.7

categ.: >

...move sensitive data from your hard drive by overwriting it several times with carefully se...everal times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell e...folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, duri...to happen regularly, at night, during your lunch break, at weekends or whenever you like. The patterns used for overwriting are based on Peter Gutmann`s paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk. Other methods include the one defined in the National Industrial Security Program Operating Manual of the...

Download size: 912 kBytes

Privacy KeeperVer.: 7.0.1

categ.: >

...racks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection t...sy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and othe...nd program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanentl... computer activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not clean data out of ...

Download size: 67800 kBytes

Free Asmw Eraser ProVer.: 3.2

categ.: >

...ase your cache, cookies, history, visited URLs, typed URLs, index.dat, Clean Forms Passwor...index.dat, Clean Forms Passwords data, temp folders and more. The cookie-cleaning and typed URLs feature allows you to specify which item to keep, s...g and typed URLs feature allows you to specify which item to keep, so that you don`t erase your important login cookies or URLs. It supports free plug-ins to extend cleaning features to support popular programs such as ACDSee...ort popular programs such as ACDSee, Acrobat, Kazaa, ICQ2003 and many others. Additional features include a secure file-shredder, scheduled cleanups, Boss Key, and support for Netscape and Opera. Asmw Eraser Pro completely implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standards, You can then completely overwrite files with random characters making them unrecoverable by und...

Download size: 1562 kBytes

Enchanted Jellyfish of the Sea ScreensaverVer.: 1.1

categ.: >

...eMyScreensaver.com and contains 20 high resolution images of Jellyfish. Jellyfish are mari... Jellyfish. Jellyfish are marine invertebrates belonging to the Scyphozoan class, and in turn the phylum Cnidaria. The body of an adult jellyfish is..., and in turn the phylum Cnidaria. The body of an adult jellyfish is composed of a bell-shaped, jelly producing substance enclosing its internal structure, from which the creature`s tentacles are suspended. Each tentacle is c...s are suspended. Each tentacle is covered with stinging cells (cnidocytes) that can sting or kill other animals: most jellyfish use them to secure prey or as a defense mechanism. - wiki Screensaver Picture Count: 20 Screensaver Type: Slideshow Credit: All images in this screensaver fall under one of the following licenses: Creative Commons, Attribution ShareAlike 2.0, public domain, GNU Free Documentation L...

Download size: 3166 kBytes

Jellyfish Curious CreaturesVer.: 1.1

categ.: >

...Screensaver.com and contains 27 high resolution images of Jellyfish. Jellyfish are marine ...llyfish. Jellyfish are marine invertebrates belonging to the Scyphozoan class, and in turn the phylum Cnidaria. The body of an adult jellyfish is co...nd in turn the phylum Cnidaria. The body of an adult jellyfish is composed of a bell-shaped, jelly producing substance enclosing its internal structure, from which the creature`s tentacles are suspended. Each tentacle is cove...re suspended. Each tentacle is covered with stinging cells (cnidocytes) that can sting or kill other animals: most jellyfish use them to secure prey or as a defense mechanism. Others, such as Rhizostomae, do not have tentacles at all. To compensate for its lack of basic sensory organs and a brain, the jellyfish exploits its nervous system and rhopalia to perceive stimuli, such as light or odor, and orchestrate e...

Download size: 4242 kBytes

Free Internet EraserVer.: 4.0

categ.: >

... Internet privacy by permanently erase internet history and past computer activities. Even...past computer activities. Even though, many of the tasks can be performed manually, Free Internet Eraser can automate this process for you. Free Int...ly, Free Internet Eraser can automate this process for you. Free Internet Eraser allows you to erase history, erase Internet history, internet cache, cookies, address bar search history of your browser, and Window`s temp fold...our browser, and Window`s temp folders, run history, search history, open/save history, recent documents and more. In addition, you can have Free Internet Eraser automatically clean your files at Windows start or shutdown. Free Internet Eraser implements the US Department of Defense DOD 5220.22-M and NSA clearing and sanitizing standard, to gives you confidence that once deleted with our Internet Eraser, your fi...

Download size: 906 kBytes

Active Kill Disk - Hard Drive EraserVer.: 5.1

categ.: >

...ermanently from any computer that can be started from floppy CD USB. Active KillDisk Profe... CD USB. Active KillDisk Professional conforms to US Department of Defense clearing and sanitizing standard DoD 5220.22-M. New Wipe function that wi...ing and sanitizing standard DoD 5220.22-M. New Wipe function that wipes out all unused space on existing drives, not touching existing data. 5.1 version supports 17 security standards from various countries such as: Br... various countries such as: Bruce Schneier`s algorithm Canadian OPS-II DoD 5220.22 M Gutmann`s algorithm German VSITR HMG IS5 Baseline HMG IS5 Enhanced Navso P-5329-26 (RL) Navso P-5329-26 (MFM) NCSC-TG-025 Russian GOST p50739-95 US Army AR380-19 US Air Force 5020 and some others You can be sure that once you wipe a disk with Act...

Download size: 10967 kBytes

Picture ProtectVer.: 1.0

categ.: >

...rs from stealing your pictures.............

Download size: 1665 kBytes

! - Privacy KeeperVer.: 7.0.1

categ.: >

...racks and program activity. Privacy Keeper is a safe and easy-to-use privacy protection t...sy-to-use privacy protection tool that securely deletes online Internet tracks and program activity records that are stored in your browser and othe...nd program activity records that are stored in your browser and other hidden files on your computer. Privacy Keeper guarantees your privacy by ensuring all traces of your online Internet and computer activities are permanentl... computer activities are permanently erased and unrecoverable on your PC. Information from every website you visit is stored on your computer and recorded in hidden Windows locations including temporary files, cookies, system registry and the index.dat file. Web browsers only provide partial privacy protection by allowing some temporary Internet files and cookies to be deleted, but they do not clean data out of ...

Download size: 67800 kBytes

Find others 'defense' freeware Pages : 1 2 3 . . . 8
 Sponsored Links:
Google
 
Web www.FreewareBox.com