|
|
Evidence
|
Evidence Exterminator License: Freeware
|
|
|
Evidence Exterminator cleans all PC usage history information. Clean up your cookies, history, temporary internet files, browser's cache, recycle bin, recent documents. Did you know that when you use Windows, open folders, search for files, work with various software, surf the Internet, use online banking to access your accounts, and so on, information about all your steps: all pictures you have seen, all passwords and bank accounts you use is stored in various files and in the Windows registry? Did you know that anybody with a minimal computer knowledge including your spouse and children, your boss and the police can easily extract detailed information about your activities and use it against you? Did you also know that when you delete your files using the Delete command, Windows does not actually delete the files but places them to the hidden RECYCLER folder, and even if you use the Empty Recycle Bin command, some files may stay in this folder and can not be deleted by Windows? Evidence Exterminator is a complex security system that ensures your privacy by destroying all hidden information connected with your activities on demand, according to a user-defined schedule or on each boot/shutdown. The program does not damage your Windows and does not delete your documents, it only cleans needless registry items and files, which potentially may contain evidence and endanger you needlessly. Think for a second: How many people you know would enjoy hurting you? Your boss or your coworkers, and how about those people you don't know? Don't loose your job just because you enjoy surfing the Internet at work! Install Evidence Exterminator on your PC before it is too late! Evidence Exterminator will remove all evidence, and will also clean all the temporary files left by your system making it cleaner and running faster.
Author: IM-Soft| Date: 08-10-2004 | Size: 984 KB
|
|
- |
|
Evidence Destructor License: Freeware
|
|
|
When you are working on your computer performing the day to day activity like surfing the Internet, paying your bills online and logging into the websites with passwords, your computer is recording most of the steps you take. For example the history of all the web sites you visited, all the pictures you downloaded, all the pages and text you see, are being recorded by the system. It is done so when you log in to the web site later, you don't have to type a whole name and you don't have to complete forms and enter passwords again. In many cases it is done for your ease of use, but the problem with that is you compromise on your security when you use all these features. If somebody were to look at your PC, which happens quite often. For example your wife wanted to use it for something, or your kids would need to play with it. Or if your computer is at work, your coworkers or your boss would have access to it. Most of the sources of information that may represent your sensitive information are stored on your computer unprotected, and can be recovered by people with some minimal knowlege of computers. It can even affect you when you least suspect it. If you, for example, let your kids download some stuff from the internet. They may download a virus or a malicious program or pictures or other offensive content without you even knowing anything about it or suspecting anything like that has happened. They can also use your computer to make purchases on the Internet (remember, your credit card an all the details are stored there and you will be left to bare the consequences of all their actions. To solve this problem, you need to clean up all the unwanted garbage that is cluttering your computer to get rid of the unwanted evidence that may be used against you one day. You need Evidence Destructor to do the job for you. This program will let you remove all the unwanted evidence from your computer and continue getting rid of it on a scheduled basis as the clutter starts to co
Author: emailarms emailarms| Date: 10-02-2004 | Size: 984 KB
|
|
- |
|
Super Slueth License: Freeware
|
|
|
Calling all detectives - A crime has been committed and you are the Super Sleuth in this exciting game of wits. Carefully examine the usual suspects, and then take your detective skills to the Crime Scene to collect evidence. Match up the clues up with the criminal and figure out who to bring to justice!
Author: Free Web Games| Date: 10-01-2005 | Size: 560 KB
|
|
- |
|
Eraser License: Freeware
|
|
|
Eraser is an advanced security tool, which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. You can drag and drop files and folders to the on-demand eraser, use the convenient Explorer shell extension or use the integrated scheduler to program overwriting of unused disk space or, for example, browser cache files to happen regularly.
Author: Heidi Computers Ltd| Date: 19-01-2003 | Size: 2654 KB
|
|
- |
|
111Free History Eraser License: Freeware
|
|
|
Free History Eraser completely erases history, typed URLs (the drop down address list) and AutoComplete. You can schedule your tasks in order to prevent the possibility of forgetting to use the program thus minimizing the danger for you. Scheduling includes 3 options: Run at Startup; Run on close IE(the last IE) and Run on shutdown Windows. It dynamically configures itself for Windows 95, 98, NT, ME, 2000, XP. It cleans evidence from multiple user profiles. For intuitive use SP has a Graphical User Interface. The easy access to the functionality simplifies the program use.
Author: Ivelin Kovatchev| Date: 06-01-2004 | Size: 318 KB
|
|
- |
|
Free History Eraser License: Freeware
|
|
|
Free History Eraser completely erases history, typed URLs (the drop down address list) and AutoComplete. You can schedule your tasks in order to prevent the possibility of forgetting to use the program thus minimizing the danger for you. Scheduling includes 3 options: Run at Startup; Run on close IE(the last IE) and Run on shutdown Windows. It dynamically configures itself for Windows 95, 98, NT, ME, 2000, XP. It cleans evidence from multiple user profiles. For intuitive use SP has a Graphical User Interface. The easy access to the functionality simplifies the program use.
Author: Smart Soft| Date: 05-05-2004 | Size: 318 KB
|
|
- |
|
Adios! Extreme Filesystem Cleaner License: Freeware
|
|
|
Adios! Extreme File System Cleaner by Martin Beek - safely removes 150+ application- and Windows garbage files from your computer. Empties garbage bins, Norton virus quarantine, Norton protected bins, Internet browser cache(s), sensitive usage information, memory dumps, Windows update and servicepack garbage and much more. Fully configurable. Analysis, (de-)selection and deletion stages. Uses fast low-level filesearch routines. Free download.
Author: Martin Beek| Date: 01-02-2003 | Size: 987 KB
|
|
- |
|
Zilla Data Nuker License: Freeware
|
|
|
When you delete a file from Windows it just mark the file as deleted in file allocation table, but the data of the file is still on your hard disk, Windows does not physically remove deleted files from your hard disk. Emptying your Recycle Bin does NOT protect you at all. Your sensitive files can be recovered, even after you format your hard disk! This powerful program helps you shred important files & folders so that they cannot be restored & prevent attempts to recover sensitive deleted files from your hard drive by data recovery or forensic software. Shredder allows you to purge, wipe & erase data with methods that far exceed US Department of Defence standards for file deletion (DOD 5220.22). Easily automate the cleaning process with batch files, shortcuts and scheduler. Completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Overwrites all bits in selected files, including cluster slack space, with binary 1's, 0's, and/or random bit patterns. Supports complete folder deletions including subfolders. Shreds disk free space so you can even use shredder to destroy previously deleted files on your hard drive. Drag & Drop files or entire folders Delete even if the file is locked! No trails are left of any compromising or confidential information. Easily choose the number of overwrites according to your security ambitions. The higher the number the less the probability that even finest magnetic tracks could be detected. The Department of Defense (DOD 5220.22-M) recommends seven passes for top security. You can also shred files by right-clicking on them from the MS Windows Explorer or on the recycle bin and selecting the shred item on the popup context menu.
Author: ZillaSoft.ws| Date: 28-04-2004 | Size: 4214 KB
|
|
- |
|
Shredator License: Freeware
|
|
|
Shredator.com is an excellent Web Cache, Disk Cleaner and Privacy Tool. Free Product Lifetime support, Free Lifetime Updates, Free Lifetime Downloads, Unique Update feature. Shred's Disk Freespace of any attached Disk, Hidden NTFS Alternate Data Streams independantly or with parent file, Internet Cache, History, Cookies, Application Data, Recycle bin, Swapfile, Index.dat files, Temp Locations and much more as well as define your own Registry or File locations. Has 'Report Mode Only' feature so that you can test your selections before destroying anything. 2000 and XP versions have additional 'Accounts' feature that enable an administrator to Shred target locations on all other account profiles on the machine. and much more...
Author: PARC Data Systems Ltd| Date: 03-10-2004 | Size: 168 KB
|
|
- |
|
Kendrick's Monster License: Freeware
|
|
|
Though Kendrick's Monster is a work of fiction, it is not pure fabrication. All the crimes described within have a firm foundation in factual modern experience. Consider: - At the age of three, Theodore Bundy awakened his caregiver when he disturbed her while stashing large knives under her mattress. He killed for the first time when he was fourteen, at which time a local neighborhood girl disappeared to her death. Bundy often wandered the streets at night, playing with 'imaginary friends', which activity quickly developed into criminal voyeurism. - Jesse Pomeroy regularly tortured and killed animals as a young child. He brutally murdered two young boys when he was only fourteen years of age. While the evidence against him was instantly damning (they found the mummified corpse of one young girl in the basement of his home), and despite his many confessions, Pomeroy eventually claimed he was innocent, because 'a voice in [his] head' told him to say so. - As early as the age of eight, Arthur Shawcross developed 'imaginary' friends, with which he would speak using 'strange voices'. By his early teens, he spent hours walking in the woods yelling at inanimate objects and beating the undergrowth with a stick, as if in torment from unseen demons. - David Berkowitz said of his crimes, "The demons never stopped. I couldn't sleep. I had no strength to fight. I could barely drive. Coming home from work one night, I almost killed myself in the car. I needed to sleep. The demons wouldn't give me any peace." While these are merely anecdotal illustrations of a murderous psyche's development, they nonetheless beg a central question; are these individuals evil and what is the true nature of this evil? Perhaps these are real, tangible demons born of an unknown, nether world. Worse still, perhaps they are fantastic, intangible demons, born of a tormented mind, fashioned from the fabric of the human nature, which is the fabric that binds us all.
Author: Publish-ME.com LLC| Date: 22-09-2004 | Size: 4882 KB
|
|
- |
| 1 |
|
|
Universal Explorer
Powerful windows explorer file manager and viewer.

Disk Size Manager Analyses hard disk space and collects statistics.

Web Data Extractor Email marketing software to extract specific contact.
 BackStreet Browser Powerful Offline Browser - Download Entire Website.
ListMotor Email List Manager, operates with email stored in simple text files or csv files.

|