BitRaser USB Creator for Mac
BitRaser USB Creator for Mac
BitRaser USB Creator for Mac / 4. How to / 4.3. Customization Settings / 4.3.2. Erasing Settings / 4.3.2.1. Erasure Algorithms
Select one of the following erasure methods as mentioned in the table.
Sr. NO. |
Erasure Methods |
Description |
1. |
NIST 800-88 Purge |
Apply the ATA Secure Erase command. The sanitize command is preferred to Secure Erase when the sanitize command is supported by the device. |
2. |
NIST 800- 88 Clear |
This algorithm overwrites media by using organizatonally approved and validated overwriting technologies / method / tools. |
3. |
British HMG IS5 Baseline Standard |
One Pass-Random Pattern. |
4. |
British HMG IS5 Enhanced Standard (3 passes) |
This algorithm is a three pass overwriting algorithm: first pass with zeros, second pass with ones and last pass with random data. |
5. |
B.Schneier's algorithm (7 passes) |
This algorithm erases data in seven phases. In the first two passes, it overwrites the hard disk with ones and then zeroes and in next five phases, it overwrites data with random characters. |
6. |
Canadian CSEC ITSG-06 |
This algorithm uses a combination of zeros and random charcters, plus ones. |
7. |
German Standard, VSITR (7 passes) |
This algorithm erases data by overwriting data with three alternating patterns of zeroes and ones and then a last pass which overwrites with random characters. |
8. |
North Atlantic Treaty Organization-NATO Standard (7 passes) |
This algorithm erases data by overwriting the media in seven passes. From pass one to six, it overwrites the data with a number and its complement alternatively. Then, in the final pass, it overwrites the data with random characters. |
9. | Pseudo-random |
This algorithm erases data by overwriting an entire hard drive with randomly generated numbers in a single pass. |
10. |
Pseudo-random & Zeroes (2 passes) |
This algorithm erases data by overwriting the hard drive in two passes. In the first pass, it overwrites data with randomly generated numbers and in second pass it overwrites the previously generated data with zeros. |
11. |
Pfitzner algorithm (33 passes) |
The Pfitzner algorithm is used in file shredding and data destruction programs to overwrite existing information on a hard drive or other storage devices. All the passes in pfitzner method consist entirely of random overwriting data in the storage device. |
12. |
Peter Gutmann, (35 passes) |
This algorithm erases data by overwriting it 35 times, making recovery of erased data by any tool impossible. This algorithm takes more time than other wiping algorithms. |
13. | Random Random Zero (6 passes) |
This algorithm erases data by overwriting a storage media with random characters in multiple passes. |
14. |
Russian Standard -GOST-R-50739-95 (2 passes) |
This algorithm erases data by overwriting the hard disk with zeros followed by a single pass of random characters. |
15. |
US Department of Defense,DoD 5220.22-M (3 passes) |
This algorithm erases data by overwriting the hard drive in three passes. In first pass, it overwrites data with zeros, then in second pass, it overwrites the data with ones and finally in the third pass overwrites the data with randomly User Manual - BitRaser Drive Eraser 35 |
16. |
US Department of Defense, DoD 5220.22-M (ECE) (7 passes) |
This algorithm erases data be overwriting the hard drive in seven passes. The first, fourth and fifth pass is overwriting with a random byte, its 8 right-bit shift complement and 16 right-bit shift complement; second and sixth passes are overwriting with zeros, and third and seventh pass with random data. This is a U.S. Department of Defense algorithm. |
17. |
US Department of Defense,DoD 5200.28-STD (7 passes) |
This algorithm erases data by overwriting the hard drive in seven passes. In first two passes, it overwrites data with certain bytes and their complements, then in next two passes it overwrites data with random characters. In fifth and sixth passes, it overwrites data with a character and its complements and finally, it overwrites data with random characters. Thisisa U.S. Department ofDefense algorithm. |
18. |
US Army AR 380-19 (3 passes) |
This algorithm erases data by overwriting the media in three passes. In the first pass, it overwrites data with random bytes, then in second and third pass, it overwrites data with certain bytes and their complements. This is a U.S. Army algorithm. |
19. |
US Air Force, AFSSI 5020 (3 passes) |
This algorithm erases the data by overwriting themedia in three passes. First, itoverwrites with zeros, then with ones and finally with random characters. |
20. |
Zeroes |
This algorithm erases data by overwriting it with zeros in a single pass. This is the fastest algorithm available to a user. |