Solved

Recommend a Secure Delete apps for Windows 7, if Free, better

Posted on 2011-09-04
13
416 Views
Last Modified: 2012-05-12
We have Windows 7 and are doing some clean up.  We found some files that we want deleted but want to delete by Secure Delete.  We have Ccleaner and has an option for this feature but it for entire Disks.

We need an apps that can secure delete a specific file(s).

Please advice
0
Comment
Question by:rayluvs
13 Comments
 
LVL 7

Accepted Solution

by:
d3ath5tar earned 84 total points
ID: 36481248
If you are looking a bin the entore Hard drive then you can use cipher.exe within windows....
http://www.windowsecurity.com/articles/Using-cipherexe.html
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
ID: 36481853
0
 
LVL 14

Expert Comment

by:Giovanni Heward
ID: 36481859
SDelete - Secure Delete v1.51
Copyright (C) 1999-2005 Mark Russinovich
Sysinternals - www.sysinternals.com

usage: sdelete [-p passes] [-s] [-q] <file or directory>
       sdelete [-p passes] [-z|-c] [drive letter]
   -c         Zero free space (good for virtual disk optimization)
   -p passes  Specifies number of overwrite passes (default is 1)
   -q         Don't print errors (Quiet)
   -s         Recurse subdirectories
   -z         Clean free space

example: sdelete -p 16 test.txt
0
Three Reasons Why Backup is Strategic

Backup is strategic to your business because your data is strategic to your business. Without backup, your business will fail. This white paper explains why it is vital for you to design and immediately execute a backup strategy to protect 100 percent of your data.

 

Author Comment

by:rayluvs
ID: 36481918
I'm not on my pc... does those apps can do secure delete to specific files?
0
 
LVL 21

Assisted Solution

by:Papertrip
Papertrip earned 83 total points
ID: 36481924
SDelete - Secure Delete v1.51
Copyright (C) 1999-2005 Mark Russinovich
Sysinternals - www.sysinternals.com

usage: sdelete [-p passes] [-s] [-q] <file or directory>
example: sdelete -p 16 test.txt
0
 
LVL 25

Expert Comment

by:madunix
ID: 36482808
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
ID: 36484857
@Ramante... Yes, SDELETE will securely erase a single file...

 
sdelete -p 16 test.txt

Open in new window

0
 

Author Comment

by:rayluvs
ID: 36516945
Thanx.  Based on your expierence whish tool presented here is the more secure?  or do they all use the same security scheme?
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
ID: 36517048
A good general rule is you want to perform at least a Standard DoD 5220.22-Mclearing and sanitizing standard wipe.  In relation to secure erasing one of the most secure methods would be the Peter Gutmann method.

Active@ ERASER has several methods for data destruction that conform to:
US Department of Defense clearing and sanitizing standard DoD 5220.22-M
German VSITR
Russian GOST p50739-95.
More sophisticated methods like Gutmann's or User Defined methods are available as well.

Of course proper physical destruction would be the "most secure" method available.  If you want to be thorough, try a complete purge (entire drive (occupied, free space, etc.) using the Gutmann method and then physical destruction (pulverize + incinerate/disintegrate).

Here is the NIST Guidelines for Media Sanitization
Recommendations of the National Institute of Standards and Technology

http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf

Table 5-1. Sanitization Methods
Clear
Overwrite media by using agency-approved and validated overwriting technologies/methods/tools.

Purge
1. Purge using Secure Erase. The Secure Erase software can be download from the University of California, San Diego (UCSD) CMRR site.
2. Purge hard disk drives by either purging the hard disk drive in an NSA/CSS-approved automatic degausser or by disassembling the hard disk drive and purging the enclosed platters with an NSA/CSS-approved degaussing wand.***
3. Purge media by using agency-approved and validated purge technologies/tools.

**Degaussing any current generation hard disk will render the drive permanently unusable.

Physical Destruction
Disintegrate.
Shred.
Pulverize.
Incinerate. Incinerate hard disk drives by burning the hard disk drives in a licensed incinerator
0
 

Author Comment

by:rayluvs
ID: 36517177
We've never used these types of apps; it's a first for us.  So we're kind of cautious of how to proceed.
   
Three last question:

   1.  Do these apps also secure-delete or over write unused disk space?

   2.  If so, wow save is it?

   3.  On the 4 apps recommended (cipher, SDelete, Active@ERASER, Eraser), which 2 apps
        would be easy to use and also have a good secure scheme?
     
0
 
LVL 14

Assisted Solution

by:Giovanni Heward
Giovanni Heward earned 333 total points
ID: 36518658
1. Yes
2. DoD 5220.22-M or Gutmann is considered "Safe"
3. SDelete (DoD 5220.22-M (default)) and Active@ ERASER (DoD 5220.22-M or Gutmann method)

You have sufficient information to proceed.
0
 

Author Comment

by:rayluvs
ID: 36519879
Thank you very much!
0
 

Author Closing Comment

by:rayluvs
ID: 36519884
Thanx
0

Featured Post

Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

If you thought ransomware was bad, think again! Doxware has the potential to be even more damaging.
Data breaches are on the rise, and companies are preparing by boosting their cybersecurity budgets. According to the Cybersecurity Market Report (http://www.cybersecurityventures.com/cybersecurity-market-report), worldwide spending on cybersecurity …
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

773 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question