ASCOMP Secure Eraser
Please note that in addition to completely deleting data, you will also be able to work with the system registry on obsolete entries. The interface is nice enough to look at, easy to use, I hope you like the utility.
Features:
- Removal of confidential user information from the hard disk.
- High reliability level.
- Clearing the registry of unnecessary records.
How to use Crack and Download Secure Eraser or how to get the full version:
- Download Secure Eraser (archive) from the link below
- Unzip and install the installer as usual (do not run the application)
- Copy the Crack file to the installation folder (or the folder specified in the Readme.txt file)
- Run the application
- Enjoy it!
Download ASCOMP SecureEraser 5.001 Pro – (8.4 Mb)
Table of Contents
Best Free Secure File Eraser
- Can securely erase files and entire drives/partitions and folders
- Can securely delete (wipe) free space
- Extremely easy to use — adds an entry in right-click context menu for easy access
- Is fast (relatively speaking)
- If a file cannot be deleted immediately, the file is deleted upon reboot
- Allows users to choose from a variety of erasure methods:
- Allows users to define custom erasure methods
- Allows users to schedule erasures
- Is portable
- Is “always on” — starts itself on Windows boot and is set by default to minimize to system tray when you X out the main program window. You can disable the minimize to system tray behavior but there appears to be no setting to disable the start-at-Windows-boot behavior.
Method Name | Passes | Description |
Gutmann Method | 35 | An overwrite session consists of a lead-in of four random write patterns, followed by patterns 5 to 31 (see rows of table below), executed in a random order, and a lead-out of four more random patterns. |
Pseudorandom Data | 1 | The fastest wiping scheme. Your data is overwritten with random data[1] (if you use a CSPRNG the data is indistinguishable from random noise.) |
British HMG IS5 (Baseline) (1 pass) | 1 | Your data is overwritten with zeroes. |
Russian GOST P50739-95 | 2 | GOST P50739-95 wiping scheme calls for a single pass of zeroes followed by a single pass of random data |
British HMG IS5 (Enhanced) | 3 | British HMG IS5 (Enhanced) is a three pass overwriting algorithm: first pass – with zeroes, second pass – with ones and the last pass with random data. |
US Army AR380-19 | 3 | AR380-19 is data wiping scheme specified and published by the U.S. Army. AR380-19 is three pass overwriting algorithm: first pass – with random data, second with a random byte and the third pass with the complement of the 2nd pass |
US Department of Defense DoD 5220.22-M (E) | 3 | DoD 5220.22-M (E) is a three pass overwriting algorithm: first pass – with zeroes, second pass – with ones and the last pass – with random data |
US Air Force 5020 | 3 | US Air Force 5020 is a three pass overwriting algorithm with the first pass being that of a random byte, followed by two passes of complement data (shifted 8 and 16 bits right respectively) |
US Department of Defense DoD 5220.22-M(ECE) | 7 | DoD 5220.22-M(ECE) is seven pass overwriting algorithm: first, fourth and fifth pass with a random byte, its 8 right-bit shift complement and 16 right-bit shift complement; second and sixth passes with zeroes, and third and seventh pass with random data |
Canadian RCMP TSSIT OPS-II | 7 | RCMP TSSIT OPS-II is a seven pass overwriting algorithm with three alternating patterns of zeroes and ones and the last pass – with a random byte |
German VSITR | 7 | The German standard calls for data to be overwritten with three alternating patterns of zeroes and ones and in the last pass with random data |
Schneier’s Algorithm | 7 | The Bruce Schneier algorithm has seven passes: first pass – with ones, the second pass – with zeroes and then five times with random data |
Runner Up
Method Name | Passes | Description |
British HMG IS5, Baseline Standard | 1 | Overwritten with zeroes with verification |
British IS5, Enhanced Standard | 3 | 3 passes overwriting algorithm: 1st pass – with zeroes, 2nd pass – with ones and the last pass with random bytes (last pass is verified). |
Russian GOST P50739-95 | 2 | Calls for a single pass of zeroes followed by a single pass of random byte. |
German Federal Office for Information Security | 3 | Non-uniform pattern, its complement. |
US Navy NAVSO P-5239-26 | 3 | 3 passes overwriting algorithm with last pass verification. |
USA DoD 5220.22-M Department of Defense | 3 | 3 passes overwriting algorithm: 1st pass – with zeroes, 2nd pass – with ones and the last pass with random bytes. With all passes verification. |
Canada Communications Security Establishment ITSG-06 | 3 | All 1s or 0s, its complement, a pseudo-random pattern |
German VSITR | 7 | Calls for each sector to be overwritten with three alternating patterns of zeroes and ones and in the last pass with character. |
Bruce Schneier’s Algorithm | 7 | 7 passes: 1st pass – with ones, 2nd pass – with zeroes and then 5 times with random characters. |
Canadian RCMP TSSIT OPS-II | 7 | 7 passes overwriting algorithm with 3 alternating patterns of zeroes and ones and the last pass – with random character (with last pass verification) |
Peter Gutmann’s Algorithm | 35 | 35 passes with various algorithms, including all of the other listed methods. |
Honorable Mention 1
- Random
- US DoD 5220.22-M E
- German Standard
- US DoD 5220.22-M ECE
- Peter Gutmann Standard
Honorable Mention 2
Secure Eraser App
- Zero Overwrite( 1 pass )
- Random Overwrite( 1 pass )
- GOST R 50739-95( 2 pass )
- DoD 5220.22-M( 3 pass )
- Schneier( 7 pass )
- Gutmann( 35 pass )
Honorable Mention 3
Ascomp Secure Eraser Review
- Simple One Pass
- Simple Two Pass
- DoD 5220-22.M
- Secure erasing algorithm with 7 passes
- Gutmann Algorithm with 35 passes
Ascomp Software Gmbh
Ascomp Software
Other Alternatives
Ascomp Backup Maker
- …and many more