SecureMac, Inc.

The Eraser Pro

June 2, 2001

Information

Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it!

Simple method. You may also choose some details of this job.

The Eraser Pro returns several information while is using the features of above and allows you to stop its performance at any time. It works fine and fast in background, deleting large groups of items, you may also instruct it to ask you the permission, …

The Eraser Pro

Information

Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it!

Simple method. You may also choose some details of this job.

The Eraser Pro returns several information while is using the features of above and allows you to stop its performance at any time. It works fine and fast in background, deleting large groups of items, you may also instruct it to ask you the permission, before deleting…

Views

Always make sure to use some sort of security method for deleting important files. When you are selling a computer or throwing it away you don’t know whose hands it might end in. Those databases you just trashed can be recovered if not deleted properly. A tool like ‘the eraser’ will ensure its gone for good. Even if you delete something with the proper tools, like nortin, you can recover the files.

Features

ERASING:
Security method. The Eraser Pro deletes your files by using a sophisticated procedure. It lets you customize many details of this job. The recovery of deleted files becomes impracticable: there’s no utility able to do it! Simple method. You may also choose some details of this job. The Eraser Pro returns several information while is using the features of above and allows you to stop its performance at any time. It works fine and fast in background, deleting large groups of items, you may also instruct it to ask you the permission, before deleting…

DISK ERASING:
The Eraser Pro may initialize your disks by using its own, customizable, method. Through a co-operation with System, The Eraser Pro allows you to take advantage of HFS+ and FSM, if you want.

PREFERENCES SEARCH:
The Eraser Pro scans this folder searching for orphan preferences files.

SYSTEM FOLDER SEARCH:
The Eraser Pro scans the whole System Folder searching for orphan files.

ORPHAN FILES SEARCH:
The Eraser Pro scans your disks and folders, searching for orphan files (you may also check individual files). You may get a more accurate analysis, searching for orphan files, by activating a couple of special options, but slackening the scan speed.

CACHE SEARCH:
The Eraser Pro may scan the cache folders of your Browsers, excluding some files according to theirs modification dates.

EMPTY ALIASES SEARCH:
The Eraser Pro may scan disks and folders (and individual files) searching for empty aliases.

EMPTY FOLDERS SEARCH:
The Eraser Pro may scan disks and folders searching for empty folders.

FOLDER ICONS SEARCH:
The Eraser Pro may scan disks and folders searching for folder icons.

DUPLICATE FILE NAMES SEARCH:
The Eraser Pro may scan disks and folders searching for duplicate file names.

CUSTOM ICONS SEARCH:
The Eraser Pro may scan disks and folders (and individual files) searching for custom icons.

FAT OBJECTS SEARCH:
The Eraser Pro may scan disks and folders (and individual files) searching for FAT Object .

FIND:
This is a cool feature! The Eraser Pro may scan disks and folders (and individual files) following your instructions: you may instruct it to search files matching type, creator, flags, extension, prefix and name. It may also skip or include files created or/and modified within the period of time you want.

Get the latest security news and deals