Solved

Recommend a Secure Delete apps for Windows 7, if Free, better

Posted on 2011-09-04
13
396 Views
Last Modified: 2012-05-12
We have Windows 7 and are doing some clean up.  We found some files that we want deleted but want to delete by Secure Delete.  We have Ccleaner and has an option for this feature but it for entire Disks.

We need an apps that can secure delete a specific file(s).

Please advice
0
Comment
Question by:rayluvs
13 Comments
 
LVL 7

Accepted Solution

by:
d3ath5tar earned 84 total points
Comment Utility
If you are looking a bin the entore Hard drive then you can use cipher.exe within windows....
http://www.windowsecurity.com/articles/Using-cipherexe.html
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
Comment Utility
0
 
LVL 14

Expert Comment

by:Giovanni Heward
Comment Utility
SDelete - Secure Delete v1.51
Copyright (C) 1999-2005 Mark Russinovich
Sysinternals - www.sysinternals.com

usage: sdelete [-p passes] [-s] [-q] <file or directory>
       sdelete [-p passes] [-z|-c] [drive letter]
   -c         Zero free space (good for virtual disk optimization)
   -p passes  Specifies number of overwrite passes (default is 1)
   -q         Don't print errors (Quiet)
   -s         Recurse subdirectories
   -z         Clean free space

example: sdelete -p 16 test.txt
0
 

Author Comment

by:rayluvs
Comment Utility
I'm not on my pc... does those apps can do secure delete to specific files?
0
 
LVL 21

Assisted Solution

by:Papertrip
Papertrip earned 83 total points
Comment Utility
SDelete - Secure Delete v1.51
Copyright (C) 1999-2005 Mark Russinovich
Sysinternals - www.sysinternals.com

usage: sdelete [-p passes] [-s] [-q] <file or directory>
example: sdelete -p 16 test.txt
0
 
LVL 25

Expert Comment

by:madunix
Comment Utility
0
Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
Comment Utility
@Ramante... Yes, SDELETE will securely erase a single file...

 
sdelete -p 16 test.txt

Open in new window

0
 

Author Comment

by:rayluvs
Comment Utility
Thanx.  Based on your expierence whish tool presented here is the more secure?  or do they all use the same security scheme?
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
Comment Utility
A good general rule is you want to perform at least a Standard DoD 5220.22-Mclearing and sanitizing standard wipe.  In relation to secure erasing one of the most secure methods would be the Peter Gutmann method.

Active@ ERASER has several methods for data destruction that conform to:
US Department of Defense clearing and sanitizing standard DoD 5220.22-M
German VSITR
Russian GOST p50739-95.
More sophisticated methods like Gutmann's or User Defined methods are available as well.

Of course proper physical destruction would be the "most secure" method available.  If you want to be thorough, try a complete purge (entire drive (occupied, free space, etc.) using the Gutmann method and then physical destruction (pulverize + incinerate/disintegrate).

Here is the NIST Guidelines for Media Sanitization
Recommendations of the National Institute of Standards and Technology

http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf

Table 5-1. Sanitization Methods
Clear
Overwrite media by using agency-approved and validated overwriting technologies/methods/tools.

Purge
1. Purge using Secure Erase. The Secure Erase software can be download from the University of California, San Diego (UCSD) CMRR site.
2. Purge hard disk drives by either purging the hard disk drive in an NSA/CSS-approved automatic degausser or by disassembling the hard disk drive and purging the enclosed platters with an NSA/CSS-approved degaussing wand.***
3. Purge media by using agency-approved and validated purge technologies/tools.

**Degaussing any current generation hard disk will render the drive permanently unusable.

Physical Destruction
Disintegrate.
Shred.
Pulverize.
Incinerate. Incinerate hard disk drives by burning the hard disk drives in a licensed incinerator
0
 

Author Comment

by:rayluvs
Comment Utility
We've never used these types of apps; it's a first for us.  So we're kind of cautious of how to proceed.
   
Three last question:

   1.  Do these apps also secure-delete or over write unused disk space?

   2.  If so, wow save is it?

   3.  On the 4 apps recommended (cipher, SDelete, Active@ERASER, Eraser), which 2 apps
        would be easy to use and also have a good secure scheme?
     
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
Comment Utility
1. Yes
2. DoD 5220.22-M or Gutmann is considered "Safe"
3. SDelete (DoD 5220.22-M (default)) and Active@ ERASER (DoD 5220.22-M or Gutmann method)

You have sufficient information to proceed.
0
 

Author Comment

by:rayluvs
Comment Utility
Thank you very much!
0
 

Author Closing Comment

by:rayluvs
Comment Utility
Thanx
0

Featured Post

Backup Your Microsoft Windows Server®

Backup all your Microsoft Windows Server – on-premises, in remote locations, in private and hybrid clouds. Your entire Windows Server will be backed up in one easy step with patented, block-level disk imaging. We achieve RTOs (recovery time objectives) as low as 15 seconds.

Join & Write a Comment

Article by: btan
Provide an easy one stop to quickly get the relevant information on common asked question on Ransomware in Expert Exchange.
By this time the large percentage of day-to-day transactions have shifted to mobile banking; here are some overriding areas QAs must investigate while testing mobile banking apps.  
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
This video demonstrates how to create an example email signature rule for a department in a company using CodeTwo Exchange Rules. The signature will be inserted beneath users' latest emails in conversations and will be displayed in users' Sent Items…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

17 Experts available now in Live!

Get 1:1 Help Now