Equipped with 16 types of data erasing method, the industry's largest number

The deletion method can be selected according to the disc to be deleted / usage.

Explanation about the deletion method installed in the DiskDeleter series
(Data deletion by software does not “delete” the data, but “overwrite” the fixed value or random number value on the data on the HDD so that the data can not be restored.)


Deletion method when there are many individual uses

There is no problem with deletion methods 1 to 4 when deleting data of personal computers, HDD, USB memory, etc., which have many employee / personal data. It is most suitable for reuse in the home or in the company.

1.Zero Write

Overwrite the data area with zero (0x00). After zero write data restoration with software becomes impossible.


2.Random Write

Overwrite the data area with a random number. After random write data restoration with software becomes impossible.


3.NIST 800-88

A method of deleting flash media such as SSD based on the latest NIST 800 – 88 recommended by the National Institute of Standards and Technology. Overwrite the entire disk area with zero (0x00), then write verify.


4.Random & Zero Write

Overwrite the data area with a random number and overwrite it with zero (0x00). Data restoration with software is impossible.

Delete method of confidential information / customer data

For HDDs, SSDs, USB memories, external HDDs, etc. which contain data that can not be leaked absolutely, confidential information and customer data from personal computers that have been discarded or leased up, we recommend grades 5 or more. Because it uses advanced deletion method, it takes more time to complete deletion than usual.


5.NIST 800-88 Advanced

A method of erasing flash media such as SSD according to the latest NIST 800 – 88 recommended by the National Institute of Standards and Technology. After overwriting the whole area of the disk with random numbers, overwrite it with zero (0x00) and write verify.


6.Random Random Zero

Overwrite the whole disk area with random number twice, then overwrite it with zero (0x00). It will be impossible to recover with software and restore with residual magnet reader.


7. Old US Department of Defense (DoD5200.28-M)

Overwrite the whole disk area with fixed values (0xff), zero (0x00), random numbers. It is a deletion method known as DoD 5200.28-M which was introduced at the US Department of Defense. It will be impossible to recover with software and restore with residual magnet reader.


8.US Air Force,AFSSI5020

After overwriting the whole disk area with zero (0x00), overwrite it with fixed value (0xff), random fixed value, and finally perform 10% write verification. It will be impossible to recover with software and restore with residual magnet reader.


9.US Department of Defense (DoD5220.22-M)

Overwrite the entire disk area with zeros, then 0xff, random numbers, and finally write verify. It is the most commonly used method in the company. It will be impossible to recover with software and restore with residual magnet reader.


10.US Navy,NAVSO P-5239-26-MFM

After overwriting the whole disk area with a fixed value (0x01), fixed value (0x7ffffff), random number, write verification is performed. It will be impossible to recover with software and restore with residual magnet reader.


11. US Navy,NAVSO P-5239-26-RLL

After overwriting the whole disk area with fixed value (0x01), fixed value (0x27ffffff), random number, write verification is performed. It will be impossible to recover with software and restore with residual magnet reader.


12.Bit Toggle

It overwrites the entire disk area four times in the order of zero (0x00), fixed value (0xff), zero (0x00), fixed value (0xff). It will be impossible to recover with software and restore with residual magnet reader.


13.German Standard:VSITR

Overwrite the entire disk area with a pattern of zero (0x00) and fixed value (0xff) three times, and finally overwrite it with a fixed value (0xAA). It will be impossible to recover with software and restore with residual magnet reader.


14. Peter Gutmann Secure Deletion

For the whole area of the disc, first overwrite the random number four times, then the fixed value 27 times, then the random number 4 times, totaling 35 times. It is a method introduced by Peter Gutmann in 1996. It will be impossible to recover with software and restore with residual magnet reader.


A method of deleting by using the delete command installed in the disk

Basically, the disk has a built-in command to reliably delete the data, but in the case of the OS of Windows 8 or later, this command is used for Serial ATA connected disk according to OS specification (restriction) I can not do that. If it is DiskDeleter, it will be possible to delete the USB connected disk using a dedicated cable.

15.Secure Erase

It deletes SSD mapping table and put it in the factory shipping state. Data is deleted at high speed by using the command provided in SATA / IDE SSD. Avoid wear leveling of SSD and delete mapping table and memory cell with zero. (Alternate bad sectors are not deleted.)


16. Enhanced Secure Erase

Delete data with unique value set inside the SSD. Data is deleted at high speed by using the command provided in SATA / IDE SSD. Avoid SSD wear leveling and delete mapping tables and memory cells with unique values set inside the SSD. (Alternate bad sectors are also deleted.)