Software... My Projects Open Source! |
Here you will find an overview of my software, complete with features, images, and detailed descriptions. Additionally, test results and links to the relevant web pages are available. My software is designed with a focus on data security. It includes tools for encrypting data, ensuring the security of HASH digital signatures, and securely deleting files. Please remember to use these tools responsibly and ethically. Unauthorized use for illegal activities is strictly discouraged. Thank you!
Speedcrypt | EasyHash | SecureDel |
Speedcrypt |
Speedcrypt is a software to encrypt your data that implements some of the most powerful and secure algorithms in the world. It also uses the most sophisticated Password Derivation Techniques, with very robust HASH Functions. Speedcrypt implements libraries such as Bouncy Castle and others among the most used in the world of Cryptography. Speedcrypt is a Free Program for encrypt the files which helps you to manage in a secure way.
The files are encrypted using the best and most Secure Encryption Algorithms currently known:
Speedcrypt is it really Free, more than that: it is Open Source. You can have a look at its full Source Code and check whether the security features are implemented correctly. Following are some of the key features of Speedcrypt:
|
| |
When you download the Speedcrypt Project, you have the option to download four different Packages. You can choose the one that best suits your needs, including the Packages that contain the Source Code. You can review, modify, and recompile them as you wish. Always make sure to download the Speedcrypt Project from the Official Website to ensure that you get completely safe versions, free from viruses, Backdoor and Malicious Software.
EasyHash |
EasyHash is a software for generating Digital HASH Signatures that is very simple and intuitive, extremely easy to use, and at the same time, highly useful. With this software, you can check the security of your downloads and compare the HASH Signatures generated by the developers of the software you intend to download from the internet. Its ease of use is combined with a very high execution speed and a range of options that simplify the user's work.
With EasyHash you can compute hashsums of files and texts. EasyHash supports most of the common hashing and one-way algorithms, including Adler-32, Cksum-32, CRC-16, CRC-16-CCITT, CRC-16-XModem, CRC-32, CRC-32-MPEG2, CRC-64, ELF-32, FCS-16, FNV-32, FNV-64, GOST, MD2, MD4, MD5, PJW-32, SDBM-32, SHA-1, SHA-256, SHA-384, SHA-512, Sum-32, XUM-32 and many more.
I have updated and modified a large part of the EasyHash Project. Now the program is capable of performing HASH verify for files and texts of any origin.
EasyHash Features:
- Ability to select from as many as twenty-five hash algorithms. You can perform targeted selections, multiple selections, or use all algorithms, all with just a few mouse clicks.
- Visualization of Hash reports by indentation of the reports themselves.
- File and text input through various techniques including copy and paste and drag and drop
- Hash verify of files and text through targeted reports
- Fixed minor bugs
- Updated the graphical interface.
System Requirements:
- EeasyHash to function properly in your system requires the .NET Framework 4.8 or higher. You can download it for free from the Microsoft® Homepage: .NET redistributable. The .NET Framework is available for all Windows® Operating Systems, starting with Windows 98. EeasyHash has bin tested on Windows Systems from version 8.0 and later. Unofficial tests were performed on Windows 7 where EeasyHash proved to work perfectly.
If you want to verify the integrity of the downloaded EashyHash Files, you can run the HASH of the files themselves. You can do this on the Internet through appropriate sites or through the HeasyHash Calculator software, which I personally recommend, and check whether the calculated HASH matches the one given on the following Webpage.
It doesn't require an Installation Setup and can be conveniently carried on a USB Pen Drive. It doesn't modify the system it operates on in any way and leaves no traces of its presence. You can use it directly from a USB Pen drive, or or to perform local hashing, from the desktop or other locations. |
SecureDel |
SecureDel is a small Utility that I created to make file deletion secure. It has six Deletion Algorithms that allow you to delete files according to your needs. It is very convenient, fast, does not require installation. SecureDel is a very powerful, fast, high-performance software. It allows you to permanently delete all types of files from your hard drive so that they cannot be recovered. To do this, SecureDel offers some of the most commonly used deletion algorithms within the developer community, these algorithms are well-tested and highly effective. It's very easy to use and comes with a very pleasant and intuitive interface. SecureDel can delete files in such a way that they cannot be recovered from your hard disk, external drives, or other types of storage media.
The new version of SecureDel introduces important updates, with an even stronger focus on the security and privacy of its users. Many improvements have been made, including the interface adaptation to most graphic cards and enhanced drag-and-drop functionality for files and folders, which can now be done simultaneously. Below are the current features of SecureDel version 1.2.2:
Deletion Algorithms:
- The data secure deletion algorithms are six, including DoD 7 Passes used by the United States Department of Defense, Gutman 35 Passes, and Securedelete, the latter specifically designed for all modern hard drives, including SSDs.
Unit Analysis:
- Upon startup, SecureDel performs a scan of all disk drives, USB drives, or other mass storage devices installed or connected to the system. A detailed report by type and brand will be displayed in the main window.
- A targeted analysis of the hard disks installed in the system will also be performed, with a report displaying their characteristics, including used and available space.
Recommended algorithm:
- SecureDel intelligently recommends the most suitable algorithm for secure, fast, and efficient data deletion based on the specific type of hard drives in the system. If the system includes multiple drives with different characteristics, SecureDel will automatically choose the most appropriate algorithm for each individual unit, ensuring optimal performance.
Recoverability of deleted files:
- Based on the selected deletion algorithm, SecureDel will display the possibilities for attempting recovery using specialized programs in this field. Additionally, on the main page, the effectiveness of the various algorithms is represented with a pleasant pie chart that translates the aforementioned characteristics into percentages.
Algorithm selection:
- The selection of algorithms is very simple. In the main window, there is a field where you can select the algorithm to use for an operational session with SecureDel. Just click with the mouse, and the selection will immediately become active.
Options:
- The program options are also configured in the main window, within a field that can be accessed with the mouse. Each option is very intuitive and easy to activate. When using SecureDel for the first time, the program is already configured for an optimal working session.
Backup File List:
- SecureDel can prepare a backup of the list of files processed for deletion. Simply enter the destination folder in the appropriate field, enable the related option, and the program will create a backup copy of the data. This procedure is very convenient when you want to sanitize your hard drive and securely store your data on an external mass storage device. Additionally, the backup process ensures that no critical files are permanently lost, giving you extra peace of mind during sensitive operations.
The File List:
- Since version 1.2.2, when preparing a list of files for the deletion process, SecureDel performs a scan to ensure that the files are not in use by another process. If they are, the program will terminate the ongoing process, freeing the file so that the deletion can proceed without errors and with maximum speed.
Drag and Drop:
- The Drag and Drop functionality has been significantly enhanced and upgraded. It is now possible to drag multiple files and folders simultaneously. With a single selection, you can drag all the files and folders you wish to include in the deletion process directly into the list.
Deletion Report:
- After each deletion process, SecureDel generates a deletion report that will display the following details in order: the algorithm used, the number of files in the list, the size in KB, the time taken, and finally, the date and time of the deletion.The reports can be saved and retrieved whenever deemed necessary. This feature provides an excellent opportunity for users who want to keep their program statistics up-to-date and understand the software's performance across different systems where it is used.
The Windows Recycle Bin:
- SecureDel now offers full control over the Windows Recycle Bin. You can view, manage, and even repair the Recycle Bin directly from within the application. This ensures that users can detect and fix any issues or corruption in the Recycle Bin, improving the overall functionality of the system. Whether it's recovering files or verifying if deleted files are properly stored in the Recycle Bin, this feature helps maintain a clean and efficient system.
- It is now possible to securely delete files and folders located in the Recycle Bin. SecureDel integrates seamlessly, allowing the program's secure deletion algorithms to be applied to these items. Additionally, traditional deletion methods are available, although they are strongly discouraged unless the files or folders have no significant value in terms of privacy.
- It is now possible to display the SID of the Windows Recycle Bin and send it to the Clipboard. Additionally, the hidden folder can be viewed. This is very useful for seeing the actual condition of the Recycle Bin: it often happens that files deleted in a traditional way do not appear in the visible folder, but are still present in the real folder. This indicates a malfunction which SecureDel can repair through a specific procedure accessible from the Popup Menu.
The Windows Clipboard:
- Now SecureDel offer the Clipboard Monitoring: with Clipboard Monitoring, SecureDel allows you to track every change in the Windows Clipboard in real-time. This feature is particularly useful for detecting any unauthorized or unexpected activities involving the Clipboard, such as malicious programs attempting to copy sensitive data without your knowledge. SecureDel provides a detailed view of Clipboard contents, giving users more control and visibility over their system’s operations.
Graphic adaptation:
- SecureDel has been significantly improved in terms of graphic adaptation. The program now adjusts to most of the graphic cards available on the market today. The interface remains clean, pleasant, and performs well on most of the resolutions commonly used in Windows environments.
Keyboard Shortcuts:
- I created SecureDel as a small utility to be used quickly on any Windows system or from external storage devices like USB drives and others. Now, it's time to further enrich this program with features like Keys shortcuts, offering a fully keyboard-controllable main menu.
Open Source:
- SecureDel is a completely free and Open-Source software distributed under the GNU license. You can freely download the program to use it as you see fit, as well as the Source Code, which you can recompile according to your needs, respecting the license under which it is distributed.
System Requirements:
- SecureDel to function properly in your system requires the .NET Framework 4.8 or higher. You can download it for free from the Microsoft® Homepage: .NET redistributable. The .NET Framework is available for all Windows® Operating Systems, starting with Windows 98. SecureDel has bin tested on Windows Systems from version 8.0 and later. Unofficial tests were performed on Windows 7 where SecureDel proved to work perfectly.
Below, among the many software tested to try to recover data deleted with SecureDel, a list of some of the most well-known and reputable ones:
Software | Hard Disk | Algorithms | Result |
Recuva | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
R-Studio | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
Disk Drill | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
DiskDigger | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
DM Disk Editor | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
Stellar Data Recovery | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
Prosoft Data Rescue 5 | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
EaseUS Data Recovery Wizard | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete | |
MiniTool Power Data Recovery | HDD - SSDs | DoD 7 Passes - Gutman 35 Passes - Securedelete |
In order to facilitate the potential recovery of data deleted with SecureDel, all tests were conducted on clean systems, with the various operating systems freshly installed and compatible with the program. The result was that not a single piece of deleted data was recovered. If you have conducted any tests or plan to do so in the future, feel free to contact me for the results obtained. Thank you!
It doesn't require an Installation Setup and can be conveniently carried on a USB Pen Drive. It doesn't modify the system it operates on in any way and leaves no traces of its presence. You can use it directly from a USB Pen drive, or for local deletions, from the desktop or other locations. |