Your Language: International
Hello Guest Login Here or
Soft4Boost Secure Eraser download

Soft4Boost Secure Eraser 4.5.3.591

Soft4Boost Secure Eraser is a robust utility that lets you securely delete files and documents, beyond any possibility of retrieval. It’s a really intuitive application that comes with a functional and plain interface.

You must simply load the file into the program, from the „Add” menu or the related buttons. It also comes with batch processing support, so you it can handle multiple files or an entire folder, at the same time.

Then you can choose which deletion method you want from the drop-down menu. The application includes various ways to permanently delete data, and the strength for each can be set from 1 to 7 passes. The supported deletion methods are 'Simple Overwrite', 'HMG IS5 Basic', 'GOST P50739-95', 'DoD 5220.22-M (E)', 'Bruce Schneier Method', 'DoD 5220.22-M (ECE)' and 'RCMP TSSIT OPS-II'.

Once you have selected the overwriting option, just click on the Start Erasing button, and the program will wipe all selected data and show the task progress in a dedicated bar. When the operation is complete, Soft4Boost Secure Eraser will let you know it was succesful in a pop-up window.

Software Specifications

  • File size:
    11.9 Mb
  • Category:
  • User Rating:
    5.0 / 5 (1 votes)
  • Editors' Review:
    Not yet reviewed
  • Downloads:
    581

User Reviews (0)

No reviews yet, be the first to add a review and we'll give you some extra points.
Similar Software
RemoveWGA 1.2
Enables you to remove the WGA
8 / 171,293
Free Firewall 1.4.9.17123
A robust firewall that protects your computer against all kinds of threats, including suspicious applications
2 / 1,121
Windows Firewall Control 6.0.2.0
A lightweight application that lets you quickly access the most frequently used options from Windows Firewall
2 / 1,676
Secret Disk 4.08
An intuitive, lightweight utility that lets you create virtual disks, and optionally hide and password protect them
2 / 944
Metasploit Community 4.14.1
Detect vulnerabilities within a custom network range by running a bruteforce attack and exploit, or a discovery scan
1 / 877
Mouse and Key Recorder 8.0
Records and replays mouse- and key clicks
0 / 828