File Shredding with Military Grade Data Wiping Algorithms

PC Encryption Software
Encrypting File System

IS Protector uses a mix of the most reliable data deletion and file shredding algorithms. IS Protector deletes pre-selected files and folders using advanced Data Termination algorithmsmaking terminated files protected against unwanted file recovery. IS Protector also applies some special techniques in order to avoid of data recovery by analyzing remanent magnetization of the hard drive.

What are the shredding algorithms?

Fast (1 pass) The fastest shredding algorithm. Your data is overwritten with zeroes.

British HMG IS5 (Baseline) (1 pass). When you terminate files with HMG IS5, your data is overwritten with zeroes with verification.

Russian GOST P50739-95 (2 passes) GOST P50739-95 shredding algorithm calls for a single pass of zeroes followed by a single pass of random byte.

British HMG IS5 (Enhanced) (3 passes) British HMG IS5 (Enhanced) is a three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes (last pass is verified).

US Army AR380-19 (3 passes) AR380-19 is data shredding algorithm specified and published by the U.S. Army. AR380-19 is three pass overwriting algorithm: first pass - with random bytes, second and third passes with certain bytes and with its compliment (with last pass verification) .

US Department of Defense DoD 5220.22-M (3 passes) DoD 5220.22-M is three pass overwriting algorithm: first pass - with zeroes, second pass - with ones and the last pass with random bytes. With all passes verification.: first pass - with certain bytes, second pass - with its complement and the last pass - with random bytes.

NAVSO P-5239-26 (RLL) - terminate files using three pass overwriting algorithm with last pass verification.

NAVSO P-5239-26 (MFM) - selected files will be terminated with three pass overwriting algorithm with last pass verification.

US Department of Defense DoD 5220.22-M(ECE) (7 passes) DoD 5220.22-M(ECE) is seven pass overwriting algorithm: first and second passes with certain bytes and with its compliment, then two passes with random character, then two passes with character and its complement and the last pass with random character.

Canadian RCMP TSSIT OPS-II (7 passes) RCMP TSSIT OPS-II is seven pass overwriting algorithm with three alternating patterns of zeroes and ones and the last pass - with random character (with last pass verification).

German VSITR (7 passes) The German standard calls for each sector to be overwritten with three alternating patterns of zeroes and ones and in the last pass with character.

Bruce Schneier (7 passes) The Bruce Schneier shredding algorithm has seven passes: first pass - with ones, the second pass - with zeroes and then five times with random characters.

Peter Gutmann (35 passes) Peter Gutmann shredding algorithm has 35 passes.