File Shredding with Military Grade Data Wiping Algorithms
IS Protector uses a mix of the most reliable data deletion and file
shredding algorithms. IS Protector deletes pre-selected files and folders using advanced Data Termination algorithmsmaking terminated files protected against unwanted file recovery. IS Protector also applies some special techniques in order to avoid of data recovery by analyzing
remanent magnetization of the hard drive.
What are the shredding algorithms?
(1 pass) The fastest shredding algorithm. Your data is overwritten with zeroes.
(1 pass). When you
terminate files with HMG IS5, your data is overwritten with zeroes with
verification.
(2 passes) GOST P50739-95 shredding algorithm
calls for a single pass of zeroes followed by a single pass of random byte.
(Enhanced) (3 passes) British HMG IS5 (Enhanced) is a three pass overwriting
algorithm: first pass - with zeroes, second pass - with ones and the last pass with
random bytes (last pass is verified).
(3 passes) AR380-19 is
data shredding algorithm specified and published by the U.S. Army. AR380-19 is three
pass overwriting algorithm: first pass - with random bytes, second and third passes
with certain bytes and with its compliment (with last pass verification) .
(3 passes) DoD 5220.22-M is three pass overwriting
algorithm: first pass - with zeroes, second pass - with ones and the last pass with
random bytes. With all passes verification.: first pass
- with certain bytes, second pass - with its complement and the last pass - with
random bytes.
- terminate files using
three pass overwriting algorithm with last pass verification.
- selected files will be terminated with three pass overwriting algorithm with last pass verification.
(7 passes) DoD 5220.22-M(ECE) is seven pass overwriting
algorithm: first and second passes with certain bytes and with its compliment,
then two passes with random character, then two passes with character and its complement
and the last pass with random character.
(7 passes)
RCMP TSSIT OPS-II is seven pass overwriting algorithm with three alternating patterns
of zeroes and ones and the last pass - with random character (with last pass verification).
(7 passes) The German standard calls for each sector to be overwritten
with three alternating patterns of zeroes and ones and in the last pass with character.
(7 passes) The Bruce Schneier shredding algorithm has seven passes:
first pass - with ones, the second pass - with zeroes and then five times with random
characters.
(35 passes) Peter Gutmann shredding algorithm has 35
passes.