Eraser Help Index
|
Top |
Introduction
|
· | Overview
|
|
|
|
· | Why to use it?
|
|
|
|
|
· | Program Information
|
Legal
|
System Requirements
|
Installed Components
|
Using Eraser
|
· | Step-by-Step
|
Step-by-Step
|
|
|
Erasing Data steps_download_3b
|
Step 1: Choose User Interface
|
Step 2: Select Data
|
Step 3: Choose Method
|
Step 4: Confirm and Erase
|
· | Configuration
|
Erasing
|
General
|
· | User interfaces
|
User Interfaces
|
Eraser
|
Basics
|
On-Demand
|
Basics
|
Entering Data
|
Erasing
|
Step-by-Step
|
Scheduler
|
Basics
|
Entering Data
|
Running Tasks
|
Viewing Results
|
Step-by-Step
|
Explorer
|
Basics
|
Drag and Drop
|
Shell Extension
|
Menu Reference
|
File Menu
|
Edit Menu
|
View Menu
|
Process Menu
|
Help Menu
|
Shell Extension
|
Basics
|
Selecting Data
|
Erasing
|
Secure Move
|
Step-by-Step
|
Launcher
|
Basics
|
Erasing
|
Step-by-Step
|
· | Tips and Tricks
|
Tips and Tricks
|
Erasing Browser Cache and Email
|
Erasing Recycle Bin
|
Erasing Paging (Swap) File
|
Erasing All Data on Drive
|
· | What Does It Do?
|
When Erasing Files
|
When Erasing Unused Disk Space
|
· | When to Use It?
|
When to Use It?
|
Special Cases
|
Common Security Problems
|
|
Advanced Topics
|
· | Advanced Topics
|
|
|
|
|
· | Abstract
|
Deleting Files
|
Overwriting Properly
|
Government Regulations
|
· | Overwriting Methods in Detail
|
Gutmann
|
|
US DoD 5220.22-M
|
Pseudorandom Data
|
|
|
· | Secure Deletion of Data from Magnetic and Solid-State Memory
|
Abstract
|
Introduction
|
Methods of Recovery for Data stored on Magnetic Media
|
Erasure of Data stored on Magnetic Media
|
Other Methods of Erasing Magnetic Media
|
Further Problems with Magnetic Media
|
Sidestepping the Problem
|
Methods of Recovery for Data stored in Random-Access Memory
|
Erasure of Data stored in Random-Access Memory
|
Conclusion
|
Acknowledgments
|
References
|
Support
|
· | Frequently Asked Questions
|
· | Problems?
|
· | Upgrading
|
· | Author
|
|
|