DiskDeleter provides 16 of the most critical data deletion methods (old)

You can select the best method based on your device, data confidentiality, management requirements, etc.

About the deletion methods installed in the DiskDeleter series:

DiskDeleter does not simply “erase” data. It “overwrites” disks using various values so that the original data cannot be restored.


Conventional deletion methods for ordinary business and personal use HDDs

Deletion methods 1 through 4 are generally sufficient for deleting data on PC, HDD, USB memory, etc., which will be re-used within the same organization.

1.Zero Write

Overwrite the data area with zero (0x00). After zero write, data restoration with data recovery software becomes impossible.


2.Random Write

Overwrite the data area with a random number. After random write, data restoration with data recovery software becomes impossible.


3.NIST 800-88

One of the most widely used data sanitization standards requested or required by the U.S. Federal government. This method is based on the recommendation by the National Institute of Standard, Special Publication (SP) 800-88, Guidelines for Media Sanitization.
Overwrite the entire disk area with zero (0x00), and then verify all the sectors have been overwritten


4.Random & Zero Write

Overwrite the data area with a random number and overwrite it with zero (0x00). Data restoration with data recovery software becomes impossible.

Deletion of highly confidential information

For deleting data whose confidentiality level is high, or when a device will be removed from an organization for disposing, returning lease, refurbishing, etc., we recommend deletion methods 5 or above grades.


5.NIST 800-88 Advanced

This method is based on the latest recommendation by the National Institute of Standard, Special Publication (SP) 800-88, Guidelines for Media Sanitization.
Overwrite the entire disk area with random numbers, overwrite it with zero (0x00), and then verify all the sectors have been overwritten.


6.Random Random Zero

Overwrite the whole disk area with random number twice, then overwrite it with zero (0x00). It will be impossible to recover with data recovery software or restore with residual magnet reader.


7. Old US Department of Defense (DoD5200.28-M)

Overwrite the whole disk area with fixed values (0xff), zero (0x00) and random numbers. It is a deletion method known as DoD 5200.28-M which was introduced at the US Department of Defense. It will be impossible to recover with data recovery software or restore with residual magnet reader.


8.US Air Force, AFSSI5020

After overwriting the whole disk area with zero (0x00), overwrite it with fixed value (0xff) and random fixed value then perform overwrite verification. It will be impossible to recover with data recovery software or restore with residual magnet reader.


9.US Department of Defense (DoD5220.22-M)

Overwrite the entire disk area with zero (0x00), overwrite it with fixed value (0xff), then with random numbers and finally verify overwrite. This is the most commonly used method when the device is to be removed from the organization. It will be impossible to recover with  data recovery software or restore with residual magnet reader.


10.US Navy, NAVSO P-5239-26-MFM

Overwrite the entire disk with a fixed value (0x01), fixed value (0x7ffffff), random number and then verify the entire disk is overwritten. It will be impossible to recover with data recovery software or restore with residual magnet reader.


11. US Navy, NAVSO P-5239-26-RLL

Overwrite the entire disk with a fixed value (0x01), fixed value (0x7ffffff), random number and then verify the entire disk is overwritten. It will be impossible to recover with data recovery software or restore with residual magnet reader.


12.Bit Toggle

It overwrites the entire disk area four times in the order of zero (0x00), fixed value (0xff), zero (0x00), fixed value (0xff). It will be impossible to recover with data recovery software or restore with residual magnet reader.


13.German Standard: VSITR

Overwrite the entire disk area with a pattern of zero (0x00) and fixed value (0xff) three times, and finally overwrite it with a fixed value (0xAA). It will be impossible to recover with data recovery software or restore with residual magnet reader.


14. Peter Gutmann Secure Deletion

Overwrite the entire disk with the random number four times, the fixed value 27 times and then the random number 4 times, in total 35 times. This is a method introduced by Peter Gutmann in 1996. It will be impossible to recover with data recovery software or restore with residual magnet reader.


Delete data by using the delete command installed in the disk

HDD has a built-in command to securely delete data, but Windows 8 or later, version OS has placed restrictions and the OS specifications do not allow the use of the command with Serial ATA connected disks. With DiskDeleter, you can wipe USB connected disks using DiskDeleter’s dedicated converter cable.

15.Secure Erase

It deletes SSD mapping table and restores factory setting. Data is deleted at high speed using the command provided in SATA / IDE SSD. Avoid wear leveling of SSD and wipe mapping table and memory cell with zero. (Replaced bad sectors are not wiped.)


16. Enhanced Secure Erase

Delete data with predetermined data patterns set by the manufacturer. Data is deleted at high speed using the command provided in SATA / IDE SSD. Avoid SSD wear leveling and delete mapping tables and memory cells with the predetermined data patterns inside the SSD. (Replaced bad sectors are also wiped.)