Data erasure does not "delete" the data, but "overwrites" fixed or random values in the data area such as SSD or HDD so that the data cannot be restored.
Grades 1-4
|
Data erasure method in individuals and companiesWhen erasing data on employee / personal HDD or USB memory, select the erasing method of grades 1 to 4. Ideal for reuse within a company or home.
|
|
---|---|---|
1. Zero light method | Overwrites the data area with zeros (0x00). Data recovery using software is not possible after zero write. It may be restored by a device that reads the residual magnetism. | |
2. Random write method | Overwrite the data area with random numbers. Data recovery using software is not possible after random write. It may be restored by a device that reads the residual magnetism. | |
3. NIST 800-88 method | A method for erasing flash media such as SSDs that comply with the latest NIST 800-88 recommended by the National Institute of Standards and Technology. After overwriting the entire disk area with zero (0x00), write verification is performed. | |
4. Random & zero write method | Overwrite the data area with a random number and then overwrite zero (0x00). Data recovery using software is not possible. It may be restored by a device that reads the residual magnetism. |
Grades 5-11
|
How to delete confidential information / customer dataIf the computer to be discarded or returned for lease contains confidential information or customer data, we recommend a grade 5 or higher erasing method. Since it uses an advanced erasing method, it takes time to complete erasing.
|
|
---|---|---|
5. NIST 800-88 Advanced method | A method for erasing flash media such as SSDs that comply with the latest NIST 800-88 recommended by the National Institute of Standards and Technology. After overwriting the entire disk area with a random number, overwrite it with zero (0x00) and perform write verification. | |
6. Current NSA method (random random zero) |
Overwrites the entire disk area with random numbers twice and then overwrites zeros (0x00). It cannot be restored by software restoration and a device that reads residual magnetism. | |
7. US Department of Defense compliant method DoD5200.28-M |
Overwrites the entire disk area with fixed values (0xff), zeros (0x00), and random numbers. An erasing method known as DoD5200.28-M introduced by the US Department of Defense. It cannot be restored by software restoration and a device that reads residual magnetism. | |
8. US Air Force AFSSI5020 |
After overwriting the entire disk area with zero (0x00), it is overwritten with a fixed value (0xff) and a random fixed value, and finally 10% write verification is performed. It cannot be restored by software restoration and a device that reads residual magnetism. | |
9. US Department of Defense compliant method DoD5220.22-M |
Overwrite the entire disk area with zeros first, then 0xff, random numbers, and finally write verification. This method is the most adopted by domestic companies and government offices. It cannot be restored by software restoration and a device that reads residual magnetism. | |
10. US Navy NAVSO P-5239-26-MFM |
Write verification is performed after overwriting the entire disk area with fixed values (0x01), fixed values (0x7ffffff), and random numbers. It cannot be restored by software restoration and a device that reads residual magnetism. | |
11. US Navy Method NAVSO P-5239-26-RLL |
Write verification is performed after overwriting the entire disk area with a fixed value (0x01), fixed value (0x27ffffff), and random numbers. It cannot be restored by software restoration and a device that reads residual magnetism. | |
12. Old NSA method Bit Toggle | Overwrites the entire disk area four times in the order of zero (0x00), fixed value (0xff), zero (0x00), and fixed value (0xff). It cannot be restored by software restoration and a device that reads residual magnetism. | |
13. German standard VSITR | Overwrites the entire disk area with a zero (0x00) and fixed value (0xff) pattern three times, and finally with a fixed value (0xAA). It cannot be restored by software restoration and a device that reads residual magnetism. | |
14. Gutman recommended method | Overwrite the entire disk area 4 times with random numbers first, then 27 times with fixed values, and finally 4 times with random numbers, for a total of 35 times. This method was introduced by Peter Gutmann in 1996. It cannot be restored by software restoration and a device that reads residual magnetism. |
Grades 15-16
|
SSD erasing method using the erasing command installed in the diskIn order to avoid misuse and unintentional operation mistakes by the user, this command cannot be executed for Serial ATA connected disks due to the specifications (restrictions) of Windows 8 or later OS. DiskDeleter makes this command available for disks connected via USB using a dedicated cable.
|
|
---|---|---|
15. Secure Erase method | A method of erasing the SSD mapping table and returning it to the factory default state. Use the commands provided by the SATA / IDE SSD to perform high-speed data erasure. Avoid wear leveling on SSDs and erase mapping tables and memory cells with zero writing. Bad sectors that have been replaced are "not erased". | |
16. Extended Secure Erase method | Erases the data with the unique value set inside the SSD. Use the commands provided by the SATA / IDE SSD to perform high-speed data erasure. It avoids SSD wear leveling and erases mapping tables and memory cells with unique values set inside the SSD. Bad sectors that have been replaced are also "erased". |
When erasing SDD or HDD, the time required to complete the work varies depending on the hardware environment of the model (HDD seek time, memory capacity, disk capacity, etc.). Here are some of the results of our in-house verification.
Time | : | 8 minutes 53 seconds / 4.47 seconds per required 1GB |
Disk size | : | 119.2GB |
memory | : | 3.9GB |
CPU | : | Intel Core i5-4200 CPU 1.60GHz |
Software used | : | DiskDeleter UX |
Erase method | : | Grade 1 Zeri Light |
Time | : | 15:00 seconds / 7.55 seconds per required 1GB |
Disk size | : | 119.2GB |
memory | : | 7.9GB |
CPU | : | Intel Core i5-7300 CPU 2.60GHz |
Software used | : | DiskDeleter UX |
Erase method | : | Grade 1 Zero Light |
Time | : | 42 minutes 33 seconds / 10.96 seconds per required 1GB |
Disk size | : | 232.9GB |
memory | : | 7.9GB |
CPU | : | Intel Core i3-2100 CPU 3.10GHz |
Software used | : | DiskDeleter UX |
Erase method | : | Grade 1 Zero Light |
Time | : | 24 minutes 06 seconds / 12.4 seconds per required 1GB |
Disk size | : | 119.2GB |
memory | : | 3.9GB |
CPU | : | Intel Core i3-3217U CPU 1.80GHz |
Software used | : | DiskDeleter UX |
Erase method | : | Grade 1 Zero Light |
Time | : | 2 hours 25minutes 41 seconds / 18.76 seconds per required 1GB |
Disk size | : | 465.8GB |
memory | : | 15.7GB |
CPU | : | Intel Core i3-7100 CPU 3.90GHz |
Software used | : | DiskDeleter UX |
Erase method | : | Grade 1 Zero Light |
Time | : | 29 minutes 32 seconds / 30.4 seconds per required 1GB |
Disk size | : | 58.2GB |
memory | : | 1.8GB |
CPU | : | Intel Atom x5-z8350 CPU 1.44GHz |
Software used | : | DiskDeleter UX |
Erase method | : | Grade 1 Zero Light |
© 2024 Jungle KK - Powered By Knowledge Fortune