Eraser Help Index
Top 



Introduction  
·Overview  
 
 
 
·Why to use it?  
 
 
 
 
·Program Information  
Legal  
System Requirements  
Installed Components  

Using Eraser  
·Step-by-Step  
Step-by-Step  
 
 
Erasing Data steps_download_3b  
Step 1: Choose User Interface  
Step 2: Select Data  
Step 3: Choose Method  
Step 4: Confirm and Erase  
·Configuration  
Erasing  
General  
·User interfaces  
User Interfaces  
Eraser  
Basics  
On-Demand  
Basics  
Entering Data  
Erasing  
Step-by-Step  
Scheduler  
Basics  
Entering Data  
Running Tasks  
Viewing Results  
Step-by-Step  
Explorer  
Basics  
Drag and Drop  
Shell Extension  
Menu Reference  
File Menu  
Edit Menu  
View Menu  
Process Menu  
Help Menu  
Shell Extension  
Basics  
Selecting Data  
Erasing  
Secure Move  
Step-by-Step  
Launcher  
Basics  
Erasing  
Step-by-Step  
·Tips and Tricks  
Tips and Tricks  
Erasing Browser Cache and Email  
Erasing Recycle Bin  
Erasing Paging (Swap) File  
Erasing All Data on Drive  
·What Does It Do?  
When Erasing Files  
When Erasing Unused Disk Space  
·When to Use It?  
When to Use It?  
Special Cases  
Common Security Problems  
 
Advanced Topics  
·Advanced Topics  
 
 
 
 
·Abstract  
Deleting Files  
Overwriting Properly  
Government Regulations  
·Overwriting Methods in Detail  
Gutmann  
 
US DoD 5220.22-M  
Pseudorandom Data  
 
 
·Secure Deletion of Data from Magnetic and Solid-State Memory  
Abstract  
Introduction  
Methods of Recovery for Data stored on Magnetic Media  
Erasure of Data stored on Magnetic Media  
Other Methods of Erasing Magnetic Media  
Further Problems with Magnetic Media  
Sidestepping the Problem  
Methods of Recovery for Data stored in Random-Access Memory  
Erasure of Data stored in Random-Access Memory  
Conclusion  
Acknowledgments  
References  

Support  
·Frequently Asked Questions  
·Problems?  
·Upgrading  
·Author