Don't give away sensitive data with your PC.

Tags: sanitize east tec fdisk utility sanitizing hard disk traces computer floppy disk personal files newsgroup activity old computers permanent records ready to perform correct data u s department information data every bit business plans trade secrets recovery programs

East-Tec DiskSanitizer GOV

EAST Technologies

Don't give away sensitive information, valuable corporate trade secrets, business plans, personal files and letters, or traces of Internet or newsgroup activity with the old computers that you or your company resells, donates, reassigns to different departments or removes from operation. Deleting all the files, formatting the hard disk or using the FDISK utility is not enough to stop people that will have access to the computer in the future to restore information using basic recovery programs. East-Tec DiskSanitizer however removes all traces of data and software from the computer hard disk, by overwriting and destroying beyond recovery every sector and every bit of information. Data is removed according with U.S. Department of Defense standards or custom user security levels. East-Tec DiskSanitizer can be operated from a floppy disk to sanitize any drive from the computer, regardless of the file system or the operating system. After selecting the drives to sanitize and the security level, the product is ready to perform its job. Powerful verification capabilities and full user control during the sanitizing process can provide the utmost assurance that all data has been completely removed beyond recovery. At the end of the sanitize process the product can generate a proof of correct data disposal by printing a sanitizing report or by saving it for permanent records.

Software Price: $74.95
Software Version: 2.1
Release Date
: 4/7/2003

Size: 0.67 MB
Platform: Win 3.1x, Windows 95/98/ME, WinNT 3.x, NT 4.x, XP, Windows 2000, Unix, Linux, MS-DOS

Download Link: East-Tec DiskSanitizer GOV Download

Keywords: navso utility secrets wipe delete recovery sanitizer overwrite security destroy privacy erase sensitive dod data drive disk beyond eraser


  Search by keyword:      

Copyright © 2003-2012