Requirements: BeeFree OS, md5 : c6486cd93f2a4fd499ddaf2b809fb193, size : 6.1 MB
BleachBit is a free and open-source disk space cleaner, privacy manager, and computer system optimizer.History
BleachBit was first publicly released on 24 December 2008 for Linux systems.[2] The 0.2.1 release created some controversy[3] by suggesting Linux needed a registry cleaner.Version 0.4.0 introduced CleanerML,[4] a standards-based markup language for writing new cleaners. On May 29, 2009, BleachBit version 0.5.0 added support for Windows XP, Windows Vista, and Windows 7.[5] On September 16, 2009, version 0.6.4 introduced command-line interface support.[6]
BleachBit is available for download through its Web site and the repositories of many Linux distributions.
As of October 15, 2009, BleachBit was more active than 99.972% of projects on SourceForge,[7][citation needed] and according to the Ubuntu Popularity Contest, BleachBit was more popular than 93.44% of installed packages.[8]
Features
- Identifying and removing Web cache, HTTP cookies, URL history, temporary files log files and Flash cookies for Firefox, Opera, Safari, APT, Google Chrome
- Removing unused localizations (also called locale files) which are translations of software
- Shredding files and wiping unallocated disk space to minimize data remanence
- Wiping unallocated disk space to improve data compression ratio for disk image backups
- Vacuuming Firefox's SQLite database which suffers fragmentation
- Command line interface for scripting automation and headless operation
Technology
BleachBit is written in the Python programming language and uses PyGTK.Most of BleachBit's cleaners are written in CleanerML,[9] an XML-based markup language for writing cleaners which is an open standard.[10] CleanerML does not only deal with deleting files, but also executes more specialized actions such as vacuuming an SQLite database (used, for example, to clean Yum).
BleachBit's file shredder uses only a single, "secure" pass[11] because its developers believe that there is a lack of evidence that multiple passes, such as the 35-pass Gutmann method, are more effective. They also assert that multiple passes are significantly slower and may give the user a false sense of security by overshadowing other ways privacy may be compromised.[12]