Eraser (software)

Last updated

Eraser
Initial release4 September 2003;20 years ago (2003-09-04)
Stable release
6.2.0.2993 / 5 October 2021;2 years ago (2021-10-05)
Repository
Written in C#, C++
Operating system Microsoft Windows
Type Secure file erasure
License GNU General Public License
Website https://eraser.heidi.ie

Eraser is an open-source [1] secure file erasure tool available for the Windows operating system. [2] [3] [4] [5] It supports both file and volume wiping. [6] [2]

Contents

Eraser securely erases data by overwriting it such that the data is irrecoverable. [1] It supports a variety of data destruction standards, including British HMG IS5 (Infosec Standard 5), American DoD 5220.22-M, and the Gutmann method which features a 35-pass overwrite. [7]

The tool has been recommended in TechAdvisor , [8] The Guardian , [3] and PC World , [9] and is a tool suggested by the United States government Computer Emergency Readiness Team. [10]

See also

Related Research Articles

Disk formatting is the process of preparing a data storage device such as a hard disk drive, solid-state drive, floppy disk, memory card or USB flash drive for initial use. In some cases, the formatting operation may also create one or more new file systems. The first part of the formatting process that performs basic medium preparation is often referred to as "low-level formatting". Partitioning is the common term for the second part of the process, dividing the device into several sub-devices and, in some cases, writing information to the device allowing an operating system to be booted from it. The third part of the process, usually termed "high-level formatting" most often refers to the process of generating a new file system. In some operating systems all or parts of these three processes can be combined or repeated at different levels and the term "format" is understood to mean an operation in which a new disk medium is fully prepared to store files. Some formatting utilities allow distinguishing between a quick format, which does not erase all existing data and a long option that does erase all existing data.

<span class="mw-page-title-main">CIH (computer virus)</span> Windows 9x computer virus

CIH, also known as Chernobyl or Spacefiller, is a Microsoft Windows 9x computer virus that first emerged in 1998. Its payload is highly destructive to vulnerable systems, overwriting critical information on infected system drives and, in some cases, destroying the system BIOS. The virus was created by Chen Ing-hau, a student at Tatung University in Taiwan. It was believed to have infected sixty million computers internationally, resulting in an estimated NT$1 billion (US$35,801,231.56) in commercial damages.

dd is a command-line utility for Unix, Plan 9, Inferno, and Unix-like operating systems and beyond, the primary purpose of which is to convert and copy files. On Unix, device drivers for hardware and special device files appear in the file system just like normal files; dd can also read and/or write from/to these files, provided that function is implemented in their respective driver. As a result, dd can be used for tasks such as backing up the boot sector of a hard drive, and obtaining a fixed amount of random data. The dd program can also perform conversions on the data as it is copied, including byte order swapping and conversion to and from the ASCII and EBCDIC text encodings.

The Encrypting File System (EFS) on Microsoft Windows is a feature introduced in version 3.0 of NTFS that provides filesystem-level encryption. The technology enables files to be transparently encrypted to protect confidential data from attackers with physical access to the computer.

An eraser is a tool for removing marks made by pencil, pen, chalk or art brushes.

<span class="mw-page-title-main">Darik's Boot and Nuke</span> Data erasure software

Darik's Boot and Nuke, also known as DBAN, is a free and open-source project hosted on SourceForge. The program is designed to securely erase a hard disk until its data is permanently removed and no longer recoverable, which is achieved by overwriting the data with pseudorandom numbers generated by Mersenne Twister or ISAAC. The Gutmann method, Quick Erase, DoD Short, and DOD 5220.22-M are also included as options to handle data remanence. DBAN can be booted from a CD, DVD, USB flash drive or diskless using a Preboot Execution Environment. It is based on Linux and supports PATA (IDE), SCSI and SATA hard drives. DBAN can be configured to automatically wipe every hard disk that it sees on a system or entire network of systems, making it very useful for unattended data destruction scenarios. DBAN exists for x86 systems.

Data remanence is the residual representation of digital data that remains even after attempts have been made to remove or erase the data. This residue may result from data being left intact by a nominal file deletion operation, by reformatting of storage media that does not remove data previously written to the media, or through physical properties of the storage media that allow previously written data to be recovered. Data remanence may make inadvertent disclosure of sensitive information possible should the storage media be released into an uncontrolled environment.

File deletion is the removal of a file from a computer's file system.

The Gutmann method is an algorithm for securely erasing the contents of computer hard disk drives, such as files. Devised by Peter Gutmann and Colin Plumb and presented in the paper Secure Deletion of Data from Magnetic and Solid-State Memory in July 1996, it involved writing a series of 35 patterns over the region to be erased.

In computing, data recovery is a process of retrieving deleted, inaccessible, lost, corrupted, damaged, or formatted data from secondary storage, removable media or files, when the data stored in them cannot be accessed in a usual way. The data is most often salvaged from storage media such as internal or external hard disk drives (HDDs), solid-state drives (SSDs), USB flash drives, magnetic tapes, CDs, DVDs, RAID subsystems, and other electronic devices. Recovery may be required due to physical damage to the storage devices or logical damage to the file system that prevents it from being mounted by the host operating system (OS).

Anti–computer forensics or counter-forensics are techniques used to obstruct forensic analysis.

<span class="mw-page-title-main">Trash (computing)</span> Temporary storage for deleted files

In computing, the trash, also known by other names such as dustbin, wastebasket, and others, is a graphical user interface desktop metaphor for temporary storage for files set aside by the user for deletion, but not yet permanently erased. The concept and name is part of Mac operating systems, a similar implementation is called the Recycle Bin in Microsoft Windows, and other operating systems use other names.

Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited, Micron, Seagate Technology, Samsung, Toshiba, Viasat UK, Western Digital. The symmetric encryption key is maintained independently from the computer's CPU, thus allowing the complete data store to be encrypted and removing computer memory as a potential attack vector.

Data erasure is a software-based method of data sanitization that aims to completely destroy all electronic data residing on a hard disk drive or other digital media by overwriting data onto all sectors of the device in an irreversible process. By overwriting the data on the storage device, the data is rendered irrecoverable.

shred is a command on Unix-like operating systems that can be used to securely delete files and devices so that it is extremely difficult to recover them, even with specialized hardware and technology; assuming it's even possible to recover the file at all. It is a part of GNU Core Utilities. Being based on the Gutmann method paper, it suffers from the same criticisms and possible shortcomings.

A trim command allows an operating system to inform a solid-state drive (SSD) which blocks of data are no longer considered to be "in use" and therefore can be erased internally.

<span class="mw-page-title-main">BleachBit</span> Free disk space cleaner, privacy manager, and computer system optimizer

BleachBit is a free and open-source disk space cleaner, privacy manager, and computer system optimizer. The BleachBit source code is licensed under the GNU General Public License version 3.

Shamoon, also known as W32.DistTrack, is a modular computer virus that was discovered in 2012, targeting then-recent 32-bit NT kernel versions of Microsoft Windows. The virus was notable due to the destructive nature of the attack and the cost of recovery. Shamoon can spread from an infected machine to other computers on the network. Once a system is infected, the virus continues to compile a list of files from specific locations on the system, upload them to the attacker, and erase them. Finally the virus overwrites the master boot record of the infected computer, making it unusable.

ShredIt is designed to securely erase files in a variety of ways, using various overwriting patterns. Originally released in 1998, Shredit is capable of erasing files on Mac OS 7 through Mac OS 10.8 and later, as well as Microsoft Windows 95 through Windows 7 and later and iOS(sublicensed by Burningthumb Software). Versions of ShredIt are available for 10.6 and later through the macOS App Store, earlier and alternate versions are available through the Mireth website.

Data sanitization involves the secure and permanent erasure of sensitive data from datasets and media to guarantee that no residual data can be recovered even through extensive forensic analysis. Data sanitization has a wide range of applications but is mainly used for clearing out end-of-life electronic devices or for the sharing and use of large datasets that contain sensitive information. The main strategies for erasing personal data from devices are physical destruction, cryptographic erasure, and data erasure. While the term data sanitization may lead some to believe that it only includes data on electronic media, the term also broadly covers physical media, such as paper copies. These data types are termed soft for electronic files and hard for physical media paper copies. Data sanitization methods are also applied for the cleaning of sensitive data, such as through heuristic-based methods, machine-learning based methods, and k-source anonymity.

References

  1. 1 2 Hassan, Nihad (2017). Digital privacy and security using windows : a practical guide. New York, NY: Apress. p. 99. ISBN   978-1-4842-2799-2. OCLC   992988887.
  2. 1 2 Pash, Adam (2011). Lifehacker : the guide to working smarter, faster, and better. Indianapolis, Ind: Wiley Pub. ISBN   978-1-118-13343-9. OCLC   762078309.
  3. 1 2 Schofield, Jack (30 November 2017). "My laptop no longer works. How can I erase my personal data?". The Guardian . Retrieved 11 December 2018.
  4. Doss, Surit (13 November 2017). "Wipe your hard drive clean". Telegraph India. Retrieved 11 December 2018.
  5. "How to permanently delete files". BT.com. Retrieved 11 December 2018.
  6. Johansen, Gerard (2017). Digital forensics and incident response : an intelligent way to respond to attacks. Birmingham, UK: Packt Publishing. p. 103. ISBN   978-1-78728-868-3. OCLC   1000390982.
  7. "Appendix A: Erasure Methods – Eraser". Eraser – Secure Erase Files from Hard Drives. Retrieved 11 December 2018.
  8. Martin, Jim (13 April 2018). "Here's how to ensure no-one can get back sensitive files you've deleted". Tech Advisor. Retrieved 11 December 2018.
  9. Zukerman, Erez (8 January 2013). "Review: Eraser removes files safely and permanently". PCWorld. Retrieved 11 December 2018.
  10. "Disposing of Devices Safely" (PDF). United States Computer Emergency Readiness Team . Retrieved 11 December 2018.