When you delete a file in Windows,
only the reference to the file is removed from the file system table. The file
still exists on disk until other data overwrites it, leaving it vulnerable to
recovery.
There are many tools available out there that allow
you to securely delete files so they cannot be recovered. This blog provides a
summary of some of the free tools available out there, many of which are
portable, allowing you to securely delete files you may temporarily save to
public computers.
Eraser
Eraser
makes it very easy to securely delete files, folders, or both. It overwrites the
files being deleted with random data. There are several options for the number
of times the files being deleted are overwritten with random data, including
two versions of the US DoD 5220.22-M standard (3-pass and 7-pass) and the
Gutmann method, which overwrites the file with random data 35 times.
You
can immediately delete files and folders using the On-Demand interface or
schedule files and folders to be securely deleted at a specific time using the
Scheduler.
Eraser
comes in a version you can install, which also allows you to add an option to
the Windows Explorer context menu to securely erase files within Explorer. You
can also download a portable version of Eraser you can take with you on a USB
flash drive to delete files you save on other computers.
Download
the installable version of Eraser from eraser.heidi.ie or
the portable version fromPortableApps.com.
Freeraser
Freeraser
is a free, portable tool that allows you to securely delete files using
drag-and-drop. You can select to delete your files using a Fast method of
filling the space with random data with one pass, using a Forced method that
utilizes the DoD 5220.22M, 3-pass standard, or using the Ultimate, or Gutmann,
method, deleting files by overwriting them with random data 35 times.
Right-clicking on the Freeraser trash can displays a menu allowing you to
manually select a file for deletion and to change the options for the program.
Download
Freeraser from pendriveapps.com.
Blank And Secure
Blank
And Secure is another portable drag-and-drop secure file deletion tool. Simply,
drag-and-drop files or folders to be deleted onto the middle box on the Blank
And Secure window. You can specify how many times the files are to be
overwritten by zeros by clicking the Overwrite X times button and selecting an
option. The deletion operation can be delayed up to 9 seconds using the Delete
Delay X sec. button.
Download
Blank And Secure from pendriveapps.com.
DP Shredder
DP
Shredder is a portable, small program that allows you to securely delete files
or directories and to overwrite the free space on a hard drive so files that
were deleted previously without using secure methods cannot be recovered. You
can easily select the method for deletion, which includes two US DoD-approved
methods and the Gutmann method, and how many times (Rounds) the method will be
applied.
Download
DP Shredder from portablefreeware.com.
SDelete
SDelete
is a command line tool allowing you to overwrite the free space on your hard
disk so any previously deleted data becomes unrecoverable. It is portable and
can be run from a USB flash drive in a command prompt window. To get help with
how to use the command, type “sdelete” (without the quotes) at the command
prompt and press Enter.
Download
SDelete from technet.microsoft.com.
CCleaner
CCleaner is
a program that removes unused, temporary files from your system, cleans up your
internet history and cookies, contains a tool for cleaning the registry, and
even allows you to clean up files from applications installed on your computer.
The latest version offers a tool for wiping the free space on your hard drive.
You can wipe the free space on a hard drive or the entire drive, securely
deleting all data on the drive. There are four options for specifying how many
times the data will be overwritten.
Download
the installable version or the portable version of CCleaner from piriform.com.
A program
for secure deletion of files is a useful addition to your software toolbox,
especially if you use different computers, some of which may be public
machines.
No comments:
Post a Comment