Vista / Win2k / Win7 / Win8 / WinXP
The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove magnetic remnants from the hard drive.
Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting methods.
eraser delete wipe destroy data hard drive
1License and operating system information is based on latest version of the software.
(No user ratings yet)