Software shredders. Chess program shredder File shredder download Russian version

– Igor (Administrator)

Free program for permanently deleting files File Shredder description

Free program for permanent deletion File Shredder allows you to safely delete file information from hard drive and removable media (flash drives, etc.), so your data cannot be recovered. The program interface is not loaded and is quite easy to learn. The convenience of the program is that it is integrated into the menu Windows Explorer, so you don't have to launch the program every time to safely clean your files. File Shredder supports multiple data rewriting algorithms, so you can control the level of security risks.

Generally, File Shredder program This is a good and interesting tool for maintaining the level of security of your data.

Free program for permanently deleting files File Shredder screenshots

To make it easier for you to familiarize yourself with the interface and not waste Internet traffic, time and effort, we suggest you take a look at the available screenshots. Free program for permanently deleting files File Shredder screenshots:

Free program for permanently deleting files File Shredder main features (characteristics)

To your users free program to permanently delete files File Shredder offers the following features:

  • Permanently delete files and data
  • Several algorithms for rewriting information
  • Embeds in Windows Explorer context menu
  • Drag and drop support (easy to remove)
  • Simple and intuitive interface

On the website you can always find all the necessary information, the download page and the official website of the developer. Remember download a free program for permanently deleting File Shredder files from the developer’s website- this is always the right move. Unfortunately, despite scanning the files with antivirus software, we cannot give you a 100% guarantee that the files are not infected. Always check downloaded files from the Internet for viruses!

pros Small. Easy to use. Has enough functionality to improve efficiency.
Minuses Not everything is provided. No scheduled launch. Very small help.
Developer File Shredder
Download page You can find File Shredder at this link
Size 2.3 MB
Version 2.50
License Free without restrictions
OS version Windows 10, 8.1, 8, 7, Vista, XP
64 bit support 64-bit OS supported
Portable
Information

Recently, another free program was updated, which was created specifically for cases when you need to reliably get rid of information. So, if you decide to go to the full news and there download File Shredder, then you will receive a tool for permanently deleting any folder and file, and this can be done with data not only located on the hard drive, but also on removable media. If you read the official description of the developer, they state that to permanently delete a file, the File Shredder program will write random bytes over the data, as well as the date and time of modification, thus it is also capable of ensuring the secrecy of deleted information.

In general, as far as I could understand, File Shredder uses five algorithms to delete files. At the same time, you are asked to make a choice, some of the options may work much longer, that is, not a second or two, but a minute or several, but you will get rid of the data more reliably, after which it will be impossible to restore it. After installation, the program can be integrated into Windows shell and from the context menu you can already mark the file or folder you need and immediately begin deleting, which will significantly reduce time. So, to summarize, it is worth noting that File Shredder can not only simply delete files, but also delete them without the possibility of recovery, you will get five algorithms for work, there is integration with Explorer, files and folders can be deleted simply by moving them to the main program window, You can also check for updates for File Shredder from the main window.

Issue name: File.Shredder.2.50
Developer.

File Shredder is an application for deleting information from any media with the ability to combine erasing algorithms. The program can work with the free space of the selected partition and provides arbitrary recording of bytes and time attributes. Allows you to irreversibly destroy information on the disk surface and in the MBR sector file table. Capable of deleting data with parallel changes in structure and actual size, performs a set number of accesses and erasing cycles.

The utility supports processing encrypted elements and contains a built-in file manager and a contextual integration function. Applies standardized data destruction methods and combines software and hardware access mechanisms.

The application ignores valid file attributes when working with removable media. Supports network protocols and turning off the computer when the cleaning procedure is completed.

Download the full Russian version of File Shredder for free from the official website without registration and SMS.

System requirements

  • Supported OS: Windows Vista, 7, 10, XP, 8.1, 8
  • Bit depth: 32 bit, x86, 64 bit

Whoever owns information owns the world. Once spoken by Winston Churchill, these words have become even more relevant today. Confidential information must not only be securely stored, but also destroyed no less securely, since written-off hard disks, discarded floppies, CDs, etc. - one of the main channels of data leakage.

There are many known precedents when, for example, hard drives computers written off when updating the company's computer equipment and then sold, confidential information remained: personal data of employees (personal account numbers in the bank, credit cards points, salary), accounting and other internal documents. According to the results of the Data, Data Everywhere study published in April 2004, 75% of those sold at auction hard drives contain information that, if desired, can be easily restored using appropriate utilities. It is not difficult to guess how such confidential information will be used if it falls into the hands of criminals. For example, from data recovered from a hard drive and from the contents of “broken” floppy disks and CDs thrown into the trash bin good specialist will be able to gain a lot from a competing company useful information. He will get an idea of ​​the situation in the company, identify promising clients, orient himself regarding development plans, etc., and one can only guess what losses and lost profits this may lead to for the company in the future. For individual users, such information leakage is less dangerous (if we are not talking about bank accounts, credit card numbers, etc.), however, if your materials have some kind of commercial value or are compromising, then it is possible that they will also want to take advantage of.

A separate story is theft of personal data. Now all over the world there is an avalanche-like increase in the number of crimes related to various financial frauds, which causes serious concern among law enforcement agencies in different countries. In the United States, on January 1 of this year, a law even came into force in the state of New Jersey, according to which every commercial company is obliged to protect the private information of clients, and if this data is no longer needed, destroy it.

For the above reasons, any information on media that is sold or transferred into the wrong hands must be deleted so that it is in principle impossible to recover, and data on “broken” media must be destroyed by either physically destroying the media or securely deleting information. By deletion is meant something other than the usual one provided for in Windows removal files and folders, and destruction of information using special software or hardware. The fact is that deleting a file using the operating system does not ensure its actual destruction. It is not the body of the file that is deleted, but only its header; the clusters in which it was written are marked as empty, and can be read until they are overwritten. Moreover, it is possible that even after rewriting the clusters, some of them will retain data from the previously erased file. For example, if a new file written over an old file, due to its smaller size, will occupy fewer clusters, then the remaining clusters at the end will contain some fragment of data from the destroyed file. Therefore remote in the usual way information to varying degrees can be recovered using specialized utilities. Formatting the hard drive is not an option: in this case, a data storage structure is formed on the disk, that is, file system, and confidential information is stored in sectors of the hard drive, which means it can be recovered.

Guaranteed destruction confidential information is possible only with the help of special devices - shredders. Initially, shredders (from English to shredd - to crush, shred) were devices for destroying information on paper media, which mechanically shred the documents being destroyed, as a result of which the information becomes unreadable. Today this concept is interpreted more broadly and shredders are also called hardware and software devices to destroy information on magnetic media.

Hardware shredders are indispensable in situations when it comes to quick or even emergency data deletion, since they destroy information instantly. Such shredders allow you to quickly eliminate unnecessary CDs and delete information, for example, from ZIP floppy disks, as well as clear the hard drive of a working computer from all data, destroy information on servers, delete data from a laptop, etc. Hardware shredders are needed by many commercial, government and military structures both for the rapid destruction of compromising data in critical situations, and for the systematic removal of data on failed or decommissioned media. Software shredders carefully erase data in accordance with one or another information destruction algorithm and are indispensable for the reliable destruction of confidential information and personal data from a hard drive before selling the computer, returning it to the employer, transferring it into the wrong hands, or writing it off. As a rule, a similar operation is performed on hard drives, although some applications are guaranteed to delete information from other media. In addition, it is useful to clean data using software shredders to completely erase an operating system infected with possible hidden viruses and spyware modules, before reinstalling it. Complete removal Removing all data from the hard drive in such a situation not only helps to get rid of unnecessary and harmful data, but also leads to increased computer performance. Therefore, it would not hurt any user to have a software shredder in their arsenal.

Hardware shredders

According to some security experts, software do not guarantee 100% reliability of data destruction. Theoretically, even after repeatedly wiping a disk in accordance with one or another algorithm, there remains a chance to restore individual pieces of information using special equipment. Therefore, the use of hardware shredders is considered mandatory for the destruction of highly sensitive data in government and military structures. For example, in England, government organizations recommend physical destruction hard drives and even the size and weight of the hammer that should be used to break information carrier if it is necessary to destroy data or after replacing the hard drive with a new one. And in the Pentagon, to destroy highly sensitive data, media are destroyed by demagnetization and exposure to high temperatures.

Compared to software, hardware shredders allow you to destroy information almost instantly. Therefore, they turn out to be indispensable in critical situations when there is a danger of leakage, disclosure or theft of information and it is much more important to quickly destroy compromising or other sensitive information than to allow it to fall into the wrong hands. In such cases, a hardware shredder, even in the absence of the user, will quickly, efficiently and quietly remove all confidential information from the computer, which can then be restored from a backup copy.

In addition to emergency cases, quick deletion of information is required when destroying large quantity storage media, for example, failed removable media or old hard drives that have become unnecessary after upgrading the computer park of a large company - performing the same operation with a software shredder will be long and tedious. Software shredders, as a rule, are focused on destroying information from hard drives, while the data to be destroyed can be stored on a variety of removable media, the information on which is easier and more convenient to delete using a hardware shredder.

Based on the principle of information destruction proposed on Russian market Hardware shredders can be divided into two groups. The first includes devices that erase information from disks using a magnetic field and do not destroy the media on physical level(Fig. 1), which allows, for example, to reuse hard drives after reformatting using special equipment. The second group consists of devices that lead to mechanical damage storage media that can no longer be used after such processing. The cost of hardware shredders is much higher than software ones, so they are mainly aimed at military, government and commercial organizations.

Rice. 1. Photographs of the surface of the hard drive before (a) and after (b) processing using an electromagnetic pulse with the “Stack” device: 1 - outer edge of the hard drive; 2 - surface defects of the magnetic plate; 3 - marking hard disk sectors

Shredders using the physical principle of exposure to a magnetic field

The list of devices on the Russian market that erase information using a magnetic field is quite extensive. The most famous are shredders of the “Raskat” series from the company “New Electronic Technologies” (http://www.runtex.ru/), “ABS” from the company Nero (http://www.nero.ru/), and “Stack” from the company “ Anna" (http://www.zaoanna.ru/), as well as a group of devices from the company "Computer Service Devices" (http://www.kcy.info/) - see table. These devices allow you to destroy data on your computer within tenths of a second. various types magnetic media: on hard drives (including those in use at the time of erasure), floppy disks, streamer tapes, Zip drives, audio and video cassettes and other magnetic storage devices. Some of the devices offered on the market are connected or built into the customer’s computer (Fig. 2), others are designed to destroy information from media during transportation or storage.

In most of these shredders, three main blocks can be distinguished: a charge storage module, an erasing chamber and a control module. In the charge storage module, the charge necessary to erase information accumulates, which takes about 2-4 s. After this, the device is ready for destruction, and if there is electrical power in this form, it can remain in this form for as long as desired - until the corresponding signal is received. After the signal arrives, the data on the storage medium is destroyed under the influence of a magnetic field pulse in the erasing chamber (different camera versions are used for different modifications of devices). Concerning personal computers, then the cameras, like the entire unit, are built into the PC case in such a way as not to interfere with the placement of other hardware components in it (Fig. 3).

Rice. 2. General form"Module" devices of the "Raskat" series (can be used as a separate device or built into a PC case)

Rice. 3. Option for installing models of information safes NSA2.2km and NSA2.4km into the computer system unit

The control module is designed to accept commands, process them in accordance with a given algorithm and start the data destruction process. In the very simple version The erase command is given by pressing a button built into the device. It is also possible to use a remote button located remotely, for example at a security post. In addition, it may be possible to trigger the device when a command is issued from the radio key fob. Typically, two types of key fobs are used: standard (operates at a distance of up to 50 m in the line of sight zone) and reinforced (allows you not only to turn on the product from a distance of up to 1 km in the line of sight zone, but also to receive confirmation of the passage of the command). In addition, a signal is provided in case of unauthorized access to the storage medium (if authorized personnel access to the storage medium is required, a special access key must be used). If necessary, the control module can be connected to motion detectors or other security sensors.

Shredders using the mechanical principle of action

List of similar shredders from Russian developers is small, and of the well-known and proven ones here, only the Unidisk device from the company of the same name can be named (http://www.unidisk.ru/).

This device is designed to destroy data from the hard drives of running PCs and servers. "Unidisk" is mounted in a box system unit, while the hard drive located in the device operates in normal mode. When receiving a control pulse, the shredder is triggered: one of its mechanisms hits the hard drive cover with enormous force, breaks through it and causes irreparable physical damage to the hard drive (a through hole with a diameter of 5 mm with deformation of the geometry of the plates - Fig. 4). The signal can be sent from remote control control or by command from the phone, in addition, the signal can be a command from sensors that are triggered when the case is opened.

Rice. 4. Hard drive destroyed by Unidisk device

This group of shredders also includes models of CD/DVD shredders from Western developers, which allow you to quickly get rid of unnecessary CDs and DVDs. Currently, there are many models of such shredders offered on the market, differing from each other in the way they destroy information and in their performance. Some limit themselves to destroying information from disks by damaging their surface, while others destroy disks physically, turning them into small chips.

The most widely available on the market are desktop models, which are small in size (the device fits on the desktop), and therefore ideal for small offices and organizations. As a rule, such shredders are capable of destroying information from 15-30 CDs in a minute. Examples of compact shredders include the Alera DVD/CD Shredder, Norazza Data Destroyer, Logicube CD Destroyer and similar models. In this case, for example, the Alera DVD/CD Shredder (Fig. 5) requires only 2 s to destroy information on one disk.

Rice. 5. Alera DVD/CD Shredder

Large companies that use a lot of DVD/CD disks should pay attention to more powerful devices that differ high performance and capable of destroying a huge number of disks. Among such devices are the Alera DVD/CD Shredder Plus XC (Fig. 6) from Alera Technologies and the Primera DS-360 Disc Shredder (Fig. 7) from Primera Technology. Both destroy CDs and DVDs at the physical level (it takes about 7 seconds to destroy one disc) and can additionally be used to destroy credit cards and small amounts of paper (up to five sheets).

Rice. 6. Alera DVD/CD Shredder Plus XC

Rice. 7. Primera DS-360 Disc Shredder

Software shredders

For programmatic destruction of information, a huge number of shredders are offered on the market, using different data erasing algorithms and characterized by different reliability (level of secrecy) and speed. All algorithms for deleting information are based on repeated rewriting of information in sectors of the hard disk and provide for writing to each byte of each hard sector disk of certain fixed values ​​or random numbers - in different algorithms this operation produced from one to 35 times. For example, the American national standard of the Department of Defense DoD 5220.22-M (E) involves recording random numbers in the first pass, numbers additional to those recorded in the previous pass in the second, and random numbers in the third. According to Bruce Schnair’s method, on the first pass the bit combination “00” is written to the data location, on the second - “11”, and on the next five passes - random numbers. In the famous algorithm of Peter Gutman, which is considered one of the most reliable, all known combinations of digits are written in turn in place of the destroyed data (a total of 35 passes are carried out). As a result, to complete of this algorithm it will take 7 times more time than erasing data on the same disk using the Bruce Schneir algorithm, and approximately 15 times more than using the US Department of Defense standard DoD 5220.22-M (E).

The level of secrecy provided by the shredder is determined by the selected algorithm and the number of passes - with an increase in the number of passes, the degree of reliability of information removal increases and at the same time the time costs increase. Conventionally, we can distinguish several levels of data destruction secrecy: the lowest (data is overwritten in 1 pass), low (3 passes), medium (6 passes), high (7 passes) and the highest (35 passes). To ensure the destruction of confidential information, in most cases seven passes are considered sufficient, and only the destruction of highly classified information in organizations dealing with state, military or commercial secrets requires the use of Peter Gutman's method. Moreover, to read data that is “clogged” even as a result of three passes using the simplest shredders, expensive equipment will be required, so such measures are quite sufficient, unless, of course, the data is of interest to professional detectives.

It is worth keeping in mind that destroying data with a shredder is a time-consuming operation that can take from several hours to several days. The duration of the operation directly depends on the data erasing method and the disk size, and the more reliable the method, the longer the procedure. Thus, software shredders will not be able to help in situations where quick data destruction is required.

Guaranteed removal of information from magnetic media can be carried out different ways. You can use the Cipher utility included with Windows 2000 and XP. Its main purpose is to encrypt folders and files, however, when launched with the /w:Path key, this utility allows you to delete data from unused volume sections without the possibility of restoring them by one-time overwriting with random information. The reliability of such deletion is low, but quite sufficient for the destruction of unclassified information. You will have to launch the utility from command line, which is not very convenient. However, the Cipher utility is included with Windows, which means you don’t have to pay for it and don’t have to download it, so this option can be a good, although not very convenient, solution for home users.

Guaranteed deletion of information is provided by a number of configuration programs and Windows optimization(System Mechanic, Magic Tweak, etc.), however, the level of reliability of such data destruction is different in each package. To get your bearings, you need to pay attention to the algorithms involved and the number of passes when erasing information. Most likely, this option will be quite sufficient for ordinary users, but unacceptable for the destruction of classified information.

Utilities for secure data destruction are often included in packages designed to protect confidential information, such as StrongDisk Pro and Acronis Privacy Expert Suite. The Burner module included in StrongDisk Pro provides overwriting free space on the disk, filling areas of the disk with random data. And the Acronis Privacy Expert Suite package contains several diverse modules for guaranteed data destruction.

And finally, there are specialized shredder programs whose main task is precisely to destroy data. The variety of software shredders on the market is enormous: applications vary in the level of reliability of data destruction, can be either paid or free, are limited to deleting confidential information only from hard drives, or allow additional destruction of information on other types of magnetic media. The number of situations when there is a need to use such a program is equally large. When choosing the optimal application, you need to take into account the required level of privacy, shredder performance, ease of use for a specific task, list of supported storage media and cost, so name best solutions It's simply impossible.

In this article, we will look at a comprehensive solution for ensuring privacy and security on a computer - the Acronis Privacy Expert Suite - and several shredder programs, trying to cover different situations and take into account the interests of different user groups. Using these shredders, commercial structures can protect their remote financial reports, various statistical, analytical and other data about the company from unauthorized access (which is necessary, for example, before writing off media with information), and private users - a variety of personal information(this is mandatory, for example, in case of sale old tough disk).

BCWipe 3.07

Developer: Jetico, Inc.

Distribution size: 2.59 MB

Price: $39.95

Running: Windows 95/98/Me/NT/2000/XP/2003 Server

The BCWipe set of utilities is a comprehensive solution for guaranteed removal of confidential information from hard drives in accordance with the American DoD 5200.28-STD standard or, in the case of highly sensitive information, the Peter Gutman algorithm. If desired, you can design and use your own data erasure schemes by adjusting the number of passes and defining the binary structures involved in each pass (Fig. 8). Considering the application's support for algorithms with the most high level secrecy, the ability to develop your own algorithms, as well as broad prospects in terms of optimizing data destruction, BCWipe can be considered the most a good decision for companies and government agencies.

Rice. 8. Creating a custom algorithm in BCWipe

The application probably implements all possible options for destroying information. You can delete files and folders while simultaneously destroying certain information from the disk (Delete with wiping) by selecting the appropriate command from the Windows Explorer context menu (Fig. 9). To eliminate traces of previously deleted data, it is possible to clear free disk space (Wipe free disk space - Fig. 10). Get rid of data hidden in the page file, where the OS can save parts of previously opened application programs files, overwriting the swap file (Swap file wiping) will help. Before selling or transferring a hard drive, it is convenient to use the Wiping a whole hard drive function. In addition, BCWipe has the ability to clear "ends of files" (the disk space from the end of a file to the last cluster used by that file) and erase directory entries (the reserved disk space where the file system stores file names and attributes).

Rice. 9. Deleting files while simultaneously erasing their corresponding data in BCWipe

Rice. 10. Clean up free disk space in BCWipe

BCWipe provides ample opportunities to optimize the data destruction process for a specific situation. The user can clearly define what needs to be cleared and in what cases; clear restrictions can be set on individual folders in which information changes infrequently, so regular data clearing is not required (this is especially true for such time-consuming operations, such as, for example , cleaning “ends of files”). Some operations in the program can be automated. Thus, you can regularly destroy information from the paging file, erase free space, erase the list of recently used files, clear special system Windows folders when the system starts and certain user folders on a specific day and time, etc. The paging file encryption utility provides additional protection data, which will not hurt when working with highly sensitive information, and using the BestCrypt module you can enable encryption of any user data: separate files, mail messages, databases, etc. BestCrypt uses such well-known encryption algorithms as Blowfish, Twofish, GOST 28147-89 and Rijndael. The built-in file viewer allows you to check the contents of files after the erasure procedure to ensure the reliability of the operation - this is especially important when experimenting with custom data destruction algorithms.

WipeDrive 3.1.1

Developer: WhiteCanyon

Distribution size: 2.22 MB

Distribution method: shareware

Price: Wipe Drive & Media Wiper - $39.95, Wipe Drive Pro & Media Wiper - $99.95

Running: Windows 3.x/95/98/Me/NT/2000/XP

The WipeDrive utility is a convenient solution for completely and relatively quickly deleting all data, including operating system files, program files and any other data from hard drives without the possibility of recovery. The MediaWiper module included in the delivery (Fig. 11) additionally allows you to destroy data from such removable media as floppy disks, USB disks, Zip disks, etc. Thanks to the built-in wizard that completely controls the data destruction process, you will be able to work with the program even for beginners. Therefore, WipeDrive can be recommended as an effective tool for destroying data before selling (transferring) a computer or simply before reinstalling an OS infected with viruses and/or spyware modules for a wide category of users - from commercial and government agencies to home users, especially since the program is available in different types. cost versions: WipeDrive & MediaWiper and WipeDrive Pro & MediaWiper. The latter differs in that it provides for the use of the package on unlimited quantity computers, provided that the program will not run on several computers at the same time.

Rice. 11. Destruction of information using MediaWiper

WipeDrive supports hard drives of any size (IDE or SCSI) and allows you to destroy data in accordance with various algorithms that provide different levels of privacy and differ in speed of information deletion. By default, the most quick option overwriting data in one pass random values, in some cases, quite sufficient for deleting ordinary information (but not confidential: passwords, credit card numbers, etc.) by home users. However, any other supported method can be installed, including US standards DoD 5220.22-M, Army AR380-19, Air Force 5020, HMG IS5, NAVSO P-5239-26, NCSC-TG-025, Canadian OPS-II, German VSITR and Russian GOST P50739-95. In addition, the program provides the ability to use its own data erasing algorithms.

Acronis Privacy Expert Suite 9.0

Developer: Acronis

Distribution size: 45.2 MB

Distribution method: shareware

Price: 499 rub.

Running: Windows 98 SE/Me/NT/XP/2003 Server

The main purpose of the Acronis Privacy Expert Suite is to ensure the security and confidentiality of work on a computer, and the ability to destroy information, which is of interest from the perspective of this article, is just one of its additional functions. Nevertheless, we considered it necessary to include this application in the review, since in terms of price and guaranteed data deletion capabilities, Acronis Privacy Expert Suite looks good even against the backdrop of specialized shredders, and the presence of a Russian-language interface makes the program even more attractive for both commercial structures and for home users.

The program implements three areas typical of software shredders: guaranteed deletion of specified directories and files (the “Shredder” module - Fig. 12), clogging previously deleted data on the entire disk at once or in its individual sections with simultaneous formatting (the “Disk Cleanup” module) ) and overwriting data in the swap file (module “Cleaning up the swap file”). Wiping is carried out using eight different methods of information destruction that meet the most well-known national standards, including the American standards DoD 5220.22-M, NAVSO P-5239-26 (RLL) and NAVSO P-5239-26 (MFM), German VSITR, Russian GOST P50739 -95, as well as algorithms by Bruce Schneier and Peter Gutman.

Rice. 12. Guaranteed deletion of specified files and folders in Acronis Privacy Expert Suite

O&O SafeErase 2.0

Developer: O&O Software GmbH

Distribution size: 5.45 MB

Distribution method: shareware

Price: $29.95

Running: Windows NT 4.0/2000/XP/2003

The O&O SafeErase shredder program is a reliable and convenient solution for guaranteed destruction of a wide variety of information, including confidential information, from your hard drive. The user has a choice of five methods for deleting data, differing in the algorithms involved and the number of passes and ultimately providing different levels of secrecy. The fastest and least reliable of them is to erase data by overwriting it once with random values. Greater reliability is ensured by the American national standards of the Department of Defense DoD 5220.22-M (E) and DoD II and the German BSI standard (Bundesamt für Sicherheit in der Informationstechnik) supported by the program. The highest security required for the destruction of documents classified as “Top Secret” is provided by a method based on the Peter Gutman algorithm and performed in 35 passes.

Using the program is extremely simple: either destroy data immediately, for example from Windows Explorer, by selecting the corresponding command that appears after installing the application in context menu(Fig. 13), or empty the basket when finished (Fig. 14). In addition, it is possible to completely erase the disk using the O&O TotalErase function, which is convenient for quickly preparing the disk for sale or transfer into the wrong hands. Taking into account the extreme simplicity of working with the program, combined with a wide range of methods that provide different levels of reliability for deleting data, and with an affordable price, the program turns out to be very attractive for a wide range of users, primarily for commercial structures and home users.

Rice. 13. Delete data from Windows Explorer

Rice. 14. Deleting data from the recycle bin

Chess program Shredder– multiple champion of various competitions among chess programs. Shredder is one of the most titled and recognized chess engines in the world. It was developed in Germany in 1993 by Stefan Mayer-Kahlen. The list of his achievements includes the following victories:

  • at the World Micro Chess Championship computer programs(World Microcomputer Chess Championship) in 1996 in Jakarta (Indonesia), in 1999 in Paderborn (Germany) and in 2000 in London (England);
  • at the World Computer Chess Championship in 1999 in Paderborn, in 2003 in Graz (Austria) and in 2009 in Pamplona (Spain);
  • at the World Blitz Championship among computer programs in 2002 in Maastricht (Netherlands), in 2003 in Graz, in 2004 in Tel Aviv (Israel), in 2005 in Reykjavik (Iceland), in 2007 in Amsterdam (Netherlands), in 2009 in Pamplona, ​​in 2010 in Kanazawa (Japan), in 2013 in Yokohama (Japan);
  • at the World Chess Championship 960 among computer programs in 2006 in Mainz (Germany);
  • at the World Computer Chess Software Champion in 2010 in Kanazawa, in 2015 and 2017 in Leiden (Netherlands).

The World Microcomputer Chess Championship (WMCC) was a separate championship cycle between 1980 and 2001, in which only microprocessor programs competed. As with the World Computer Chess Championship (WCCC), the organizer was the International Association computer games(ICCA - formerly, ICGA - currently).

Shredder has a universal style, he is equally strong at all stages of the game, perfectly combining tactical motives and strategic understanding of the position.

The engine compares favorably with most others due to its own GUI GUI This may be especially interesting for beginner chess players, for whom finding and installing an interface for working with the engine, as well as an opening book, may cause difficulties in the first couple of years.

Rating for 2018

Multiprocessor version of the engine Deep Shredder 13 is currently firmly among the strongest chess programs. In one of the most popular rating lists CCRL 40/40 as of April 5, 2018, Deep Shredder ranks 5th: http://www.computerchess.org.uk/ccrl/4040/

DownloadShredder for free

Shredder is commercial software and is not distributed free of charge. However, for review, the developer offers the opportunity to download a free demo version of the product.

Available at operating systems: Windows, Macintosh, Linux.

Internet