Deletor 5.13

Deletor helps you reduce the clutter in your disks and other storage media by deleting files and folders matching your criteria. The program can search multiple root folders and delete files according to their tags, metadata, time, duration, size, attributes, name and name patterns including wildcards. A shredding feature is also available to destroy sensitive documents and make them virtually impossible to recover. ...

Author Basta Computing, Inc.
License Free To Try
Price $19.95
Released 2023-06-27
Downloads 338
Filesize 5.64 MB
Requirements 10MB of free disk space
Installation Install and Uninstall
Keywords Basta, Deletor, delete, shred, erase, wipe, files, folders, sensitive, data, secure, batch, remove, cache, destroy, purge, schedule, filter, tag, metadata, command line, cli, cmd
Users' rating
(20 rating)
DeletorFile & Disk ManagementWin2000, Windows XP, Windows 7 x32, Windows 7 x64, Windows 8, Windows 10, WinServer, WinOther, Windows Vista, Windows Vista x64
Deletor in line - Download Notice

Using Deletor Free Download crack, warez, password, serial numbers, torrent, keygen, registration codes, key generators is illegal and your business could subject you to lawsuits and leave your operating systems without patches. We do not host any torrent files or links of Deletor on rapidshare.com, depositfiles.com, megaupload.com etc. All Deletor download links are direct Deletor full download from publisher site or their selected mirrors.
Avoid: in line oem software, old version, warez, serial, torrent, Deletor keygen, crack.
Consider: Deletor full version, in line full download, premium download, licensed copy.

Deletor in line - The Latest User Reviews

Most popular File & Disk Management downloads

ugrep

7.4.0 download

**Software Review: ugrep by Genivia R&D Labs** **Overview:** ugrep, developed by Genivia R&D Labs under the guidance of Robert van Engelen, is a powerful, versatile, and high-performance command-line search tool ...

New Version

Duplicate File Detective

7.3.69 download

Duplicate File Detective, developed by Key Metric Software LLC, is a robust and sophisticated tool designed to streamline the process of identifying and managing duplicate files on your computer or network. ...

Import From Windows Live Mail to Outlook 2010

6.9 download

You can simply rely on HOT Birdie EML to PST Converter program if you wish to perform the process of import from Windows Live Mail to Outlook 2010 e-mail environment in ...

DiskPulse Server

16.9.26 download

... using a client GUI application or a command line utility. The user is provided with the ability to filter changes by the change type, file type, extension, etc. In addition, ...

AJC Sync Portable

4.17.0.3 download

... run with full visual control, via the command line or on a regular basis via the scheduler. Full logging, reporting and emailing is provided to notify you about what happened. ...

Loxx

1.02.2968 download

Loxx, developed by mommos-software, is a sophisticated log file viewer designed to streamline the process of monitoring, analyzing, and troubleshooting log files. Tailored for IT professionals, developers, and system administrators, Loxx ...

Image To PDF(PDF E-Book Maker)

3.2 download

... Image to PDF Converter does include a command line application. We offer high performance conversion tools to convert TIFF to PDF, PDF to TIFF, concatenate, append and split PDF files. ...

Emissary

5.5 download

... compression - advanced CAB-LZX algorithm Support for command line packaging and build automation is fully available. ...

XCompare (formerly DiffMerge)

2.0.3 download

... files. XCompare shows detailed highlights of changes within lines. It can be configured to ignore differences in whitespace, comments, line endings and character case, as well as changes in lines matching specified regular expressions. The latter is useful ...

BatchPurifier

8.3 download

... also be operated from shell menu and command line. Purchase BatchPurifier™ today and free yourself and your organization from the worry of unintentional sensitive data leakage through the hidden ...