Skærmbilleder:
Beskrivelse
What is deleted from the hard drive is far from gone. As long as the data is not overwritten, anyone can make it visible again at any time. This is particularly problematic when a computer is resold or given away. Secure Eraser utilizes recognized methods for data deletion and overwrites confidential information so securely that it cannot be restored even with specialized software. But that's not all: Our award-winning solution for secure data destruction also removes cross-references that could allow conclusions about the former existence of the deleted files in the allocation tables of your hard drives. The very easy-to-use Windows software overwrites sensitive data up to 35 times - whether it's files, folders, drives, the recycle bin, or browsing traces. Even already deleted files can be securely erased afterwards. In addition to overwriting with random values, Secure Eraser adheres to the guidelines of the NIST SP 800-88 standard, offering the proven standards US DoD 5220.22-M E and US DoD 5220.22-M ECE from the US Department of Defense, the German Industrial Standard, and the Peter Gutmann Standard for selection. All deletion processes are meticulously logged upon request. In order to be allowed to use the software permanently, a free registration via the software is necessary.