| Rating: 0 |
| Total Hits - 0 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. By featuring revolutionary Transparent Wiping, BCWipe allows you to automatically wipe all contents of any deleted file or temporary file beyond forensic recovery. Available for Windows, Mac and UNIX, BCWipe comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards: German VSITR standard, Bruce Schneier''s recommended wiping scheme, Peter Gutmann method, British HMG IS5 (Baseline, Enhanced), Canadian RCMP TSSIT OPS-II, NAVSO-P5239-26, Russian GOST R 50739-95, US Army AR380-19, One random pass. In addition, you can also create your own customized wiping scheme to permanently wipe data. |
| https://www.jetico.com | Last Updated on 11/8/2023 10:59:00 AM |
| Download | Version 7.05.4 |
| Rating: 0 |
| Total Hits - 9 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| Permanently delete data and wipe free space with BCWipe. BCWipe is trusted throughout the U.S. DoD to securely erase files and folder beyond recovery - including free space, file slack space, MFT records, Internet and local history, directory entries, NTFS log file and directory slack space. By featuring revolutionary Transparent Wiping, BCWipe allows you to automatically wipe all contents of any deleted file or temporary file beyond forensic recovery. Available for Windows, Mac and UNIX, BCWipe comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards: German VSITR standard, Bruce Schneier''s recommended wiping scheme, Peter Gutmann method, British HMG IS5 (Baseline, Enhanced), Canadian RCMP TSSIT OPS-II, NAVSO-P5239-26, Russian GOST R 50739-95, US Army AR380-19, One random pass. In addition, you can also create your own customized wiping scheme to permanently wipe data. |
| https://www.jetico.com | Last Updated on 2/6/2024 12:59:00 PM |
| Download | Version 7.50.2 |
| Rating: 0 |
| Total Hits - 11 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas like Host Protected Area (HPA) and Device Configuration Overlay (DCO). BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards. In addition, you can also create your own customized wiping scheme. The wiping procedure can be run on any hardware platform with x386 and 64-bit AMD/Intel architecture, Itanium or 64-bit SPARC, regardless of the operating system installed on the computer. |
| http://www.jetico.com | Last Updated on 1/17/2017 10:50:00 AM |
| Download | Version 3.5.0 |
| Rating: 0 |
| Total Hits - 0 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas like Host Protected Area (HPA) and Device Configuration Overlay (DCO). BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards. In addition, you can also create your own customized wiping scheme. The wiping procedure can be run on any hardware platform with x386 and 64-bit AMD/Intel architecture, Itanium or 64-bit SPARC, regardless of the operating system installed on the computer. |
| https://www.jetico.com | Last Updated on 9/1/2023 5:17:00 AM |
| Download | Version 5.02.5 |
| Rating: 0 |
| Total Hits - 0 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| Before selling, disposing or donating used computers, securely erase hard drives with BCWipe Total WipeOut. Trusted as the de-facto standard for the U.S. DoD, BCWipe Total WipeOut erases boot records, filesystem structures, operating system files and service areas like Host Protected Area (HPA) and Device Configuration Overlay (DCO). BCWipe Total WipeOut comes built with the U.S. Department of Defense (DoD 5220.22-M) and U.S. Department of Energy (DoE M 205.1-2) standards, as well as other popular wiping standards. In addition, you can also create your own customized wiping scheme. The wiping procedure can be run on any hardware platform with x386 and 64-bit AMD/Intel architecture, Itanium or 64-bit SPARC, regardless of the operating system installed on the computer. |
| https://www.jetico.com | Last Updated on 2/24/2024 4:42:00 PM |
| Download | Version 5.3.0 |
| Rating: 1 |
| Total Hits - 74 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| This program was developed as an easy to use application that was designed to recover images, movies, and sound files from all types of Digital Media. It was designed to be compatible with Memory Sticks, SmartMedia, CompactFlash I & II, Micro Drives, SD/XD Cards, Multimedia Chips, Floppy Disks and most other forms of Digital Film. Simply insert your Digital Film into the reader, and run This program on the media, and then save the pictures. |
| http://specout.mbcoll.org/productfinder/photorcvr4mac.com.html | Last Updated on 7/2/2008 6:15:00 PM |
| Download | Version 6.2.2142 |
| Rating: 0 |
| Total Hits - 16 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico''s encryption software provides protection from physical threats - such as lost computers and USB sticks - to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico''s disk encryption is the best TrueCrypt alternative.
Disk encryption features:
- Encrypt system and boot volumes
- Support for UEFI-based computers, including secure boot
- Encrypt RAID and all types of volumes residing on fixed and removable disks
- Pre-boot authentication
- Support for Tokens for secure hardware storage of encryption keys
- Two-factor authentication with removable disk drives
- User-friendly encryption
- Option to boot encrypted volumes only from trusted network
- Support for Trusted Platform Module (TPM) for unattended reboot
- Secure hibernation
- Rescue functions to decrypt volumes in emergency case
- Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only) |
| https://www.jetico.com | Last Updated on 8/25/2023 3:10:00 AM |
| Download | Version 5.11.4 |
| Rating: 0 |
| Total Hits - 0 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico''s encryption software provides protection from physical threats - such as lost computers and USB sticks - to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico''s disk encryption is the best TrueCrypt alternative.
Disk encryption features:
- Encrypt system and boot volumes
- Support for UEFI-based computers, including secure boot
- Encrypt RAID and all types of volumes residing on fixed and removable disks
- Pre-boot authentication
- Support for Tokens for secure hardware storage of encryption keys
- Two-factor authentication with removable disk drives
- User-friendly encryption
- Option to boot encrypted volumes only from trusted network
- Support for Trusted Platform Module (TPM) for unattended reboot
- Secure hibernation
- Rescue functions to decrypt volumes in emergency case
- Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only) |
| https://www.jetico.com | Last Updated on 11/16/2023 5:28:00 AM |
| Download | Version 5.12 |
| Rating: 0 |
| Total Hits - 0 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| BestCrypt Volume for Disk Encryption protects all data on all types of volumes residing on fixed and removable disks - simple volumes, mount points, multipartition volumes (spanned, mirrored, striped, RAID-5), while also working on UEFI and GPT partitions. Jetico''s encryption software provides protection from physical threats - such as lost computers and USB sticks - to protect your privacy and comply with regulations (HIPAA, PCI). BestCrypt Volume Encryption utilizes a wide variety of algorithms (AES, Twofish, Serpent) and the largest possible key sizes with XTS, LRW encryption modes. By working with volumes, Jetico''s disk encryption is the best TrueCrypt alternative.
Disk encryption features:
- Encrypt system and boot volumes
- Support for UEFI-based computers, including secure boot
- Encrypt RAID and all types of volumes residing on fixed and removable disks
- Pre-boot authentication
- Support for Tokens for secure hardware storage of encryption keys
- Two-factor authentication with removable disk drives
- User-friendly encryption
- Option to boot encrypted volumes only from trusted network
- Support for Trusted Platform Module (TPM) for unattended reboot
- Secure hibernation
- Rescue functions to decrypt volumes in emergency case
- Central management for deployment, monitoring, encryption policy distribution and password recovery (Enterprise Edition only) |
| https://www.jetico.com | Last Updated on 2/15/2024 2:50:00 PM |
| Download | Version 5.12.3 |
| Rating: 1 |
| Total Hits - 120 | Hits Today - 0 | View Ratings | Add Your Rating |
| |
|
| Better File Rename is a shell extension for the Windows Explorer, which allows users to quickly rename multiple files.
This powerful, yet easy-to-use utility transforms the often tedious and time-consuming task of renaming multiple files into a simple matter of seconds.
Better File Rename is ideally suited for webmasters, users who need to transfer files from UNIX, digital camera owners, as well as for all other users who deal with large numbers of files, such as image collections. |
| http://www.publicspace.net | Last Updated on 7/2/2008 6:15:00 PM |
| Download | Version 2.6 |