Data Erasure Standards are set forth by government agencies
and private organizations for software-based overwriting to ensure that the
wiped information remains irretrievable. The standards provide guidelines for
overwriting existing data with specific patterns, such as zeroes, ones, or
random sequences.
Algorithms implementing these standards employ techniques
ranging from single-pass overwrites to multi-pass procedures to sanitize your
data. We use some of the most time-tested and globally recognized data erasure
standards. You can select the one that best serves your individual needs.
Erasure Algorithms Used by Stellar File Eraser
Stellar File Eraser allows you to choose from a list of three
erasure algorithms – zeroes, pseudo-random, and DoD 5220.22-M.
Zeroes: Also
known as the zero-fill method, zeroes is one of the fastest data-wiping
algorithm. It erases each bit of data by replacing it with binary 0s in a
single pass. National Institute of Standards and Technology (NIST) states that
a single-pass overwrite is enough to completely erase data, making zeroes a
good enough algorithm to wipe your personal data beyond recovery.
Pseudo-random: This
algorithm erases data by overwriting it with random bits in a single pass. It
uses a pseudo-random number generator to produce random data patterns. The
wiping speed is not as fast as zeroes as it uses additional computation to
generate randomness. However, it offers better protection that zero overwriting.
DoD 5220.22-M: This
rigorous data sanitization algorithm involving multiple overwrite passes. It
was developed by the U.S. Department of Defense (DoD) and set the benchmark for
data wiping and hardware disposal. The first pass overwrites all data with
binary 0s. The second pass overwrites the data with binary 1s and the third
pass overwrites all data with a random bit pattern.
Criteria |
Zeroes |
Pseudo-random |
DoD 5220.22-M |
Number of Passes |
1 |
1 |
3 |
Data Written |
Zeroes |
Random bits |
Zeroes, ones, random bits |
Security Level |
Low |
Medium |
High |
Time Required |
Fast |
Moderate |
Slow |
Verification Methods Offered by Stellar File Eraser
Stellar File Eraser offers you the option to choose from a
list of three verification methods – no verification, random verification,
total verification.
No verification:
No verification is performed if only data traces are erased.
Random verification:
After the erasure is completed, the storage drive is randomly verified. The
software verifies randomly selected sectors of the storage device.
Total verification:
This option verifies every sector of the storage drive after the erasing operation
is complete.
How Do You Select an Algorithm and Enable Verification on the Stellar File
Eraser?
Step 1: Launch Stellar File Eraser.
Step 2: Go to Settings on the menu bar.
Step 3: Select General, click the Algorithm drop-down menu, and select the preferred algorithm.
Step 4: Click the
Verification drop-down menu and
select the preferred verification method.
Step 5: Lastly,
click OK to save your preferences.
Note: Click Reset to restore the default settings.