Eraser 5.8
Erase data permanently. Free.
Product Specifications
| User Rating: | item has less then 1 vote |
|
| FileCart Rating | ||
| Submitted by: | heidi151 | |
| License | Freeware | |
| Price | $0.00 | |
| Downloads | 998 | |
| OS Support | Windows Install and Uninstall | |
| File Name | EraserSetup.exe | |
| File Size | 2.29 MB ( 2,344 KB ) | |
| Published | Oct 26, 2004 (21 years ago) | |
| Updated | Apr 08, 2011 (15 years ago) | |
Latest Searches
dows aj gateway 5 minutes ago
allinanchor:"..ng" "france corporate web crypto management tracking " 9 minutes ago
last z server update 10 minutes ago
nvidia geforce driver 12 minutes ago
nvdia app 13 minutes ago
Expertbook B1400CB 14 minutes ago
shogo87 16 minutes ago
nvidia driver download 16 minutes ago
lhfqdthf yf dbltjrfhne 17 minutes ago
Popular Searches
id cards 602 times
2025 393 times
2024 385 times
Softperfect 316 times
Database Workbench Pro 258 times
TeraByte Drive Image Backup and Restore 255 times
Elcomsoft Phone Breaker 251 times
Elcomsoft Phone Viewer 232 times
SAM Broadcaster Cloud 223 times
Product Details
Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns.
You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk.
Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.
You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly, at night, during your lunch break, at weekends or whenever you like.
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove the magnetic remnants from the hard disk.
Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data. You can also define your own overwriting methods.
| Requirements: | Windows Common Control 4.72 |
| Release Info: | Minor Update on Jan 05, 2008 |
Reviews
You must be logged in to write a review
Reviews of Eraser 5.8
You can be the first to write a review of Eraser!Most Viewed Windows Secure File Deletion
Mutilate File Wiper 2.97
BlazingTools Perfect Keylogger 1.99
Active@ ERASER 4.1.0.7
ShredIt for Windows 5.4
Lastbit MD5 Password Recovery 4.0.1135
DeleteOnClick 2.4.2.0
Family Spy Software 11.9
Search and Recover 5.4.9.51
QuickBooks Key 8.0
Most Downloaded Windows Secure File Deletion
BlazingTools Perfect Keylogger 1.99
Lastbit MD5 Password Recovery 4.0.1135
Windows Password Recovery Bootdisk 5.0
Mutilate File Wiper 2.97
C-Privacy 2.3
Search and Recover 5.4.9.51
Dark Files 6.2.1.1a
Clean Disk Security 8.0
DeleteOnClick 2.4.2.0