About the deletion methods installed in the DiskDeleter series:
DiskDeleter does not simply “erase” data. It “overwrites” disks using various values so that the original data cannot be restored.
-
- Zero Write
- Random Write
- NIST 800-88
- Random & Zero Write
- NIST 800-88 Advanced
- Random Random Zero
- Old US Department of Defense (DoD5200.28-M)
- US Air Force, AFSSI5020
- US Department of Defense (DoD5220.22-M)
- US Navy, NAVSO P-5239-26-MFM
- US Navy, NAVSO P-5239-26-RLL
- Bit Toggle
- German Standard: VSITR
- Peter Gutmann Secure Deletion
- Secure Erase
- Enhanced Secure Erase
Conventional deletion methods for ordinary business and personal use HDDs
Deletion methods 1 through 4 are generally sufficient for deleting data on PC, HDD, USB memory, etc., which will be re-used within the same organization.
1.Zero Write
Overwrite the data area with zero (0x00). After zero write, data restoration with data recovery software becomes impossible.
2.Random Write
Overwrite the data area with a random number. After random write, data restoration with data recovery software becomes impossible.
3.NIST 800-88
One of the most widely used data sanitization standards requested or required by the U.S. Federal government. This method is based on the recommendation by the National Institute of Standard, Special Publication (SP) 800-88, Guidelines for Media Sanitization.
Overwrite the entire disk area with zero (0x00), and then verify all the sectors have been overwritten
4.Random & Zero Write
Overwrite the data area with a random number and overwrite it with zero (0x00). Data restoration with data recovery software becomes impossible.
Deletion of highly confidential information
For deleting data whose confidentiality level is high, or when a device will be removed from an organization for disposing, returning lease, refurbishing, etc., we recommend deletion methods 5 or above grades.
5.NIST 800-88 Advanced
This method is based on the latest recommendation by the National Institute of Standard, Special Publication (SP) 800-88, Guidelines for Media Sanitization.
Overwrite the entire disk area with random numbers, overwrite it with zero (0x00), and then verify all the sectors have been overwritten.
6.Random Random Zero
Overwrite the whole disk area with random number twice, then overwrite it with zero (0x00). It will be impossible to recover with data recovery software or restore with residual magnet reader.
7. Old US Department of Defense (DoD5200.28-M)
Overwrite the whole disk area with fixed values (0xff), zero (0x00) and random numbers. It is a deletion method known as DoD 5200.28-M which was introduced at the US Department of Defense. It will be impossible to recover with data recovery software or restore with residual magnet reader.
8.US Air Force, AFSSI5020
After overwriting the whole disk area with zero (0x00), overwrite it with fixed value (0xff) and random fixed value then perform overwrite verification. It will be impossible to recover with data recovery software or restore with residual magnet reader.
9.US Department of Defense (DoD5220.22-M)
Overwrite the entire disk area with zero (0x00), overwrite it with fixed value (0xff), then with random numbers and finally verify overwrite. This is the most commonly used method when the device is to be removed from the organization. It will be impossible to recover with data recovery software or restore with residual magnet reader.
10.US Navy, NAVSO P-5239-26-MFM
Overwrite the entire disk with a fixed value (0x01), fixed value (0x7ffffff), random number and then verify the entire disk is overwritten. It will be impossible to recover with data recovery software or restore with residual magnet reader.
11. US Navy, NAVSO P-5239-26-RLL
Overwrite the entire disk with a fixed value (0x01), fixed value (0x7ffffff), random number and then verify the entire disk is overwritten. It will be impossible to recover with data recovery software or restore with residual magnet reader.
12.Bit Toggle
It overwrites the entire disk area four times in the order of zero (0x00), fixed value (0xff), zero (0x00), fixed value (0xff). It will be impossible to recover with data recovery software or restore with residual magnet reader.
13.German Standard: VSITR
Overwrite the entire disk area with a pattern of zero (0x00) and fixed value (0xff) three times, and finally overwrite it with a fixed value (0xAA). It will be impossible to recover with data recovery software or restore with residual magnet reader.
14. Peter Gutmann Secure Deletion
Overwrite the entire disk with the random number four times, the fixed value 27 times and then the random number 4 times, in total 35 times. This is a method introduced by Peter Gutmann in 1996. It will be impossible to recover with data recovery software or restore with residual magnet reader.
Delete data by using the delete command installed in the disk
HDD has a built-in command to securely delete data, but Windows 8 or later, version OS has placed restrictions and the OS specifications do not allow the use of the command with Serial ATA connected disks. With DiskDeleter, you can wipe USB connected disks using DiskDeleter’s dedicated converter cable.
15.Secure Erase
It deletes SSD mapping table and restores factory setting. Data is deleted at high speed using the command provided in SATA / IDE SSD. Avoid wear leveling of SSD and wipe mapping table and memory cell with zero. (Replaced bad sectors are not wiped.)
16. Enhanced Secure Erase
Delete data with predetermined data patterns set by the manufacturer. Data is deleted at high speed using the command provided in SATA / IDE SSD. Avoid SSD wear leveling and delete mapping tables and memory cells with the predetermined data patterns inside the SSD. (Replaced bad sectors are also wiped.)