BitRaser File Eraser Network
BitRaser File Eraser Network
BitRaser File Eraser Network / 3. First Steps / 3.5. Customization and Settings / 3.5.1. General Settings / 3.5.1.1. Erasure Options
BitRaser File Eraser Network provides a selection of eighteen high-quality erasure algorithms such as "NIST 800-88 Clear" and "US Department DoD 5220.22-M". Additionally, it offers various erasure verification methods such as Random verification and Total verification, ensuring comprehensive data elimination. For further information, you can find detailed descriptions below:
Erasing Algorithm |
Description |
NIST 800- 88 Clear |
This algorithm overwrites media by using organizationally approved and validated overwriting technologies/methods/tools. |
British HMG IS5 (3 passes) |
This algorithm is a three pass overwriting algorithm: first pass with zeros, second pass with ones and the last pass with random data. |
B.Schneier's algorithm (7 passes) |
This algorithm erases data in seven passes. In the first two passes, it overwrites the hard disk with ones and then zeros and in the next five passes, it overwrites data with random characters. |
Canadian RCMP TSSIT OPS-II (4 passes) |
This algorithm is four pass overwriting algorithm with alternating patterns of zeros and ones and the last pass - with a random byte. |
German Standard, VSITR (7 passes) |
This algorithm erases data by overwriting data with three alternating patterns of zeros and ones and then the last pass which overwrites with random characters. |
North Atlantic Treaty Organization-NATO Standard (7 passes) |
This algorithm erases data by overwriting the media in seven passes. From pass one to six, it overwrites the data with a number and its complement alternatively. Then, in the final pass, it overwrites data with random characters. |
Pseudo-random |
This algorithm erases data by overwriting an entire hard drive with randomly generated numbersin a single pass. |
Pseudo-random & Zeroes (2 passes) |
This algorithm erases data by overwriting the hard drive in two passes. In first pass, it overwrites data with randomly generated numbers and in second passit overwrites the previously generated data with zeros. |
Pfitzner algorithm (33 passes) |
The Pfitzner algorithm is used in file shredding and data destruction programs to overwrite existing information on a hard drive or other storage devices. All the passes in Pfitzner method consist entirely of random overwriting of data in the storage device. |
Peter Gutmann, (35 passes) |
This algorithm erases data by overwriting it 35 times, making recovery ofthe erased data by any tool impossible. This algorithm takes more time than other wiping algorithms. |
Random Random Zero (6 passes) |
This algorithm erases data by overwriting a storage media with random characters in multiple passes. |
Russian Standard - GOST-R-50739-95 (2 passes) |
This algorithm erases data by overwriting the hard disk with zeros followed by a single pass of random characters. |
US Department of Defense, DOD 5220.22-M (3 passes) |
This algorithm erases data by overwriting the hard drive in three passes. In the first pass, it overwrites data with zeros, then in the second pass, it overwrites the data with ones and finally in the third pass overwrites the data with randomly generated bytes. This is a U.S. Department of Defense algorithm. |
US Department of Defense, DOD 5220.22-M (7 passes) |
This algorithm erases data by overwriting the hard drive in seven passes. The first, fourth and fifth pass is overwriting with a random byte, its 8 right-bit shift complement and 16 right-bit shift complement; second and sixth passes are overwriting with zeros, and third and seventh pass with random data. This is a U.S. Department of Defense algorithm. |
US Department of Defense, DOD 5200.28-STD (7 passes) |
This algorithm erases data by overwriting the hard drive in seven passes. In first two passes, it overwrites data with certain bytes and their complements, then in next two passes it overwrites data with random characters. In fifth and sixth passes, it overwrites data with a character and its complements and finally, it overwrites data with random characters. This is a U.S. Department of Defense algorithm. |
US Army AR 380-19 (3 passes) |
This algorithm erases data by overwriting the media in three passes. In the first pass, it overwrites data with random bytes, then in second and third pass, it overwrites data with certain bytes and their complements. This is a U.S. Army algorithm. |
US Air Force, AFSSI 5020 (3 passes) |
This algorithm erasesthe data by overwriting the media in three passes. First, it overwrites with zeros, then with ones and finally with random characters. |
Zeroes |
This algorithm erases data by overwriting it with zeros in a single pass. Thisisthe fastest algorithm available to a user. |
Verification Methods |
Description |
No Verification |
Select this option if verification is not needed for the erasure process. |
Random Verification |
In Random Verification method, the sectors of the storage devices are selected randomly to verify the erasure operation performed. |
Total Verification |
In Total Verification method, all the sectors of the storage devices are verified after the erasure operation is performed. |