Files Shredder

broken image


iShredder™ Windows to securely wipe files,
folders and hard drives

Thanks to intuitive navigation and helpful wizards, users can permanently erase data from their hard drives or external data storage devices, thus ensuring that confidential information can't fall into the wrong hands.

iShredder™ is the most popular data eraser for iOS, Android, Windows, Mac, and Windows Server. Since 2010, this secure deletion software has won numerous awards and is used by more than 4,000,000 users, in over 100 countries worldwide.
iShredder™ uses data shredding techniques that go beyond international standards. Its data deletion is so secure that government agencies and defense ministries trust, and use this robust process.

iShredder™ 7 is a state-of-the-art and professional tool that has won numerous awards, and that allows for secure deletion of data from hard drives and external data storage devices.

This user-friendly solution, which runs under Microsoft Windows, enables users to efficiently delete their data in such a way as to preclude reconstruction, even by government agencies.

When you delete a file or a photo, the operating system removes the reference to that data but does not eliminate the actual information on your memory. It just only marked as free so that another file can come and use those blocks.

What is iShredder™? IShredder™ is the most popular data eraser for iOS, Android, Windows, Mac, and Windows Server. Since 2010, this secure deletion software has won numerous awards and is used by more than 4,000,000 users, in over 100 countries worldwide. That allows file recovery tools, including the Windows built-in tools, to easy search the computer for deleted files and recover them. File Shredder overwrites the data the file originally held, then cleans the metadata (file creation times etc.), and then deletes the file.

With the award-winning free space erase feature in iShredder™ you can wipe the unused disk space securely so that deleted data cannot be recovered.

In a sector where trust and security are primary concerns, Protectstar™ provides his customers with only modern and first-class products. iShredder™ Windows offers more than twenty secure deletion methods certified by the government and military organizations.

Erasure Algorithm:

- Choose method
  • 50 Cycles: Protectstar SDA (2007)
  • 35 Cycles: Gutmann method
  • 8 Cycles: German BSI TL-03423
  • 7 Cycles: NATO Standard
  • 7 Cycles: DoD 5220.22-M ECE
  • 7 Cycles: CANADIAN RCMP TSSIT OPS-II
  • 5 Cycles: BSI-2011-VS
  • 4 Cycles: Protectstar ASDA (2017)
  • 4 Cycles: DoD 5220.22-M E for SSD
  • 3 Cycles: Canadian CSEC ITSG-06
  • 3 Cycles: HMG Nr. 5 extended
  • 3 Cycles: AFSSI-5020
  • 3 Cycles: NAVO P-5239-26 (MFM)
  • 3 Cycles: NAVO P-5239-26 (RLL)
  • 3 Cycles: US Army AR380-19
  • 3 Cycles: DoD 5220.22-M E
  • 3 Cycles: NCSC-TG-025
  • 3 Cycles: NIST SP 800-88
  • 2 Cycles: RUSSIAN GOST R 50739-95
  • 1 Cycle: Australian ISM 6.2.92
  • 1 Cycle: 0XFF for SSD
  • 1 Cycle: Random Values
  • 1 Cycle: NIST SP 800-88 Rev. 1 (2014)

Specifically developed by Protectstar™ Inc. in 2007 it runs through fifty erasure routines.
Data will be overwritten for two times with a random value, afterwards with their complements. It includes and the DoD 5220.22-M (E) standard and Peter Gutmann method and random algorithms.

The algorithm from Peter Gutmann was found in 1996 and makes 35 overwrite passes in total.
This algorithm is one of the state-of-the-art methods for data destruction.

In March 2010 the German Federal office for IT Security (BSI) published a new technical BSI Guideline for 'Requirements to overwrite memory media'.
The method is similar to VSITR standard for magnetic storage media.
In total the new algorithm has 8 cycles, which has to be worked through in chronological order. Includes one cycle of verification.

The NATO method is the deletion standard of North Atlantic Treaty Organization (NATO).
It will overwrite the target data area 7 times.
The first six overwrites are with the fixed values (0x00) and (0xff), alternating between passes.
The 7th overwrite is with a random value i.e. 0x00,0xFF,0x00,0xFF,0x00,0xFF and 7th pass with a random value.

The method for high security is based on the January 1995 'National Industrial Security Program Operating Manual'by the Department of Defense (DoD).
In this seven cycle variation (DoD 5220.22-M ECE), data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific random value, and finally once again with DoD 5220.22-M (E).

The Royal Canadian Mounted Police Standard RCMP TSSIT OPS-II overwrites data securely with alternating sequences with a total of seven cycles.

The German Federal office for IT Security (BSI) describes in the technical BSI guideline for 'Requirements to overwrite memory media' from July 2010 the modern method BSI-2011.
This clause includes 5 steps, which is implemented in sequential order.

The Advanced Secure Deletion Algorithm developed by Protectstar™ in 2017 includes a pass that encrypts the blocks completely using the 256-bit AES doing a complete verification of written data.
The last pass wipes all data through a random pattern, while high-quality random numbers are generated based on Federal information processing standards (FIPS).

This method is specially developed for SSD (Solid State Drive) and flash memory, based on the U.S.
Department of Defense's standard DoD 5220.22-M E. It will overwrite data four times.

The Canadian CSEC ITSG-06 sanitization method has three cycles and was published in 2006 by Communication Security Establishment Canada (CSEC).

The HMG Infosec Standard No 5 - enhanced level is approved to wipe UK Government Top Secret data and has also been approved by NATO.
The algorithm is a three pass overwriting algorithm: first pass - with zeros (0), second and third passes with its compliment and random values(with last pass verification).

The AFSSI-5020 sanitization method was originally defined in the Air Force System Security Instruction 5020 by the United States Air Force (USAF) in 1996 and may still be today.

This is the US Navy standard NAVSO P-5239-26 for MFM encoded drives.
This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0xbfffffff) and then random values.
Finally, the target data area is read to verify the overwrites.

This is the US Navy standard NAVSO P-5239-26 for RLL encoded drives.
This deletion method first writes the fixed value (0xffffffff) to the target data area, then the fixed value (0x27ffffff) and then random values.
Finally, the target data area is read to verify the overwrites.

AR380-19 is the data shredding algorithm specified and published by the U.S. Army.
The algorithm is a three pass overwriting algorithm: first pass - with random bytes, second and third passes with certain bytes and with its compliment (with last pass verification).

The method for low security but for high execution speed is based on the January 1995 'National Industry Security Program Operating Manual' from the DoD (US DoD 5220.22-M).
The variation (DoD 5220.22-M E) offers 3 cycles in which the data are overwritten with first a set value, then its compliment, and then a random value.

The American NCSC-TG-025 standard of the National Computer Security Center (NCSC) securely overwrites existing information on a data medium three times.

The in 2006 released standard is the Special Publication 800-88 from NIST, which is the go-to data erasure standard for organizations in the United States. Its principles can apply to magnetic, flash-based, and other storage technologies, from USB drives to servers.

The Russian data deletion standard GOST R 50739-95 for secure data erasure overwrites the target data are two tome. In the first pass with a zero, and in the second pass with random characters.

ISM 6.2.92 is the Australian government's data sanitization standard.
The method was originally defined in the Information Security Manual (ISM) issued by the Australian Department of Defense: Intelligence & Security.
The ISM 6.2.92 sanitization can not be used to sanitize classified information.

This method is specially developed for SSD (Solid State Drive) and flash memory.
It offers one cycle which data are overwritten by the pattern '0xFF'.

This method for lowest security but for very high execution on speed. It offers only one cycle which data are overwritten with random values.

In December 2014, the guidelines were revised, making the current version 'NIST Special Publication 800-88 Rev. 1'.

See here the description of the method you have selected.

International Security Standards

iShredder™ surpasses international standards used by state and military organizations in secure file deletion with a wide selection of tried-and-trusted state-of-the-art deletion algorithms. Each algorithm has been analyzed by authorities and independent organizations to make sure it really does what it says on the tin – data destruction beyond redemption.
iShredder™ comes with deletion algorithms such as DoD 5220.22-M E, US Air Force (AFSSI-5020), US Army AR380-19, BSI-2011-VS, DoD 5220.22-M ECE, BSI/VS-ITR TL-03423, CSEC ITSG-06, NATO Standard, Gutmann, HMG InfoSec No.5, DoD 5220.22 SSD and others.

GDPR-compliant data erasure

With the latest European General Data Protection Regulation (EU GDPR), new requirements for the secure deletion of data have arrived, which applies to all companies.
If sensitive information falls into the wrong hands, this can result in a serious loss of revenue, penalties, or damage to reputation. In addition to the GDPR Art.17 'Right to erasure (‘right to be forgotten')', please see article: https://gdpr-info.eu/art-17-gdpr/ - data protection laws prescribe a thoroughly documented destruction of data. Personal data is no longer required, for which there is no legal basis for long-term storage, and must be permanently and securely removed from the IT systems.
iShredder™ offers all possibilities for complete protection of sensitive information, and GDPR-compliant data deletion, including detailed erasure reports.

iShredder™ Windows

Professional

Military

Server

Military
Server

Secure erase of files, folders and partitions
Secure cutting and pasting of files and directories
Secure erase of external devices
Smart secure erase wizard
Secure erase of temporary Windows files
Secure erase of temporary internet files
Advanced deletion logs
iShredder™ Windows

Professional

Military

Server

Military
Server

Secure erase of files, folders and partitions
Secure cutting and pasting of files and directories
Secure erase of external devices
Smart secure erase wizard
Secure erase of temporary Windows files
Secure erase of temporary internet files
Advanced deletion logs
Preinstalled secure erasing methods like DoD 5220.22-M, HMG Infosec No.5, German BSI-2011-VS, US Army AR380-19 and more.
Additional secure erasing methods like DoD 5220.22-M ECE, Peter Gutmann
Special secure wiping algorithms for SSD & flash memory
Protectstar™ Secure Deletion Algorithm
Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 , USAF AFSSI-5020 and CSEC ITSG-06.
1 Year technical support
Erasing methods in total11181118
Windows Server compatible
Buy NowBuy NowBuy NowBuy Now

Supported Operating Systems:

  • Windows XP, Windows 7, Windows 8 and Windows 10 native 32- and 64-bit

Minimal Hardware Requirements

  • Minimal system requirements of the operation system
  • 20 MB free hard drive space
  • Internet connection for updates and activation

Languages

  • English, German

File Shredder Free Download

iShredder™ Windows is officially compatible with Microsoft Windows 7, Windows 8, and Windows 10. The Windows logo program helps customers in selecting suitable software, which works perfectly with the new operating system in terms of compatibility and reliability. The certification was granted after rigorous testing by Microsoft.

  • Premium technical support
  • 3 years of free updates and upgrades
  • Best value for your money

All iShredder™ products come with a 12-months professional service and free updates and upgrades.
To extend your maintenance support further, purchase a Care Plan.

The Care Plan gives you 36-months premium support and free upgrades to new versions for the next three years.

Professional

  • Secure erase of files, folders and partitions
  • Secure cutting and pasting of files and directories
  • Secure erase of external devices
  • Smart secure erase wizard
  • Secure erase of temporary Windows files
  • Secure erase of temporary internet files
  • Advanced deletion logs
  • Special secure wiping algorithms for SSD & flash memory
  • Protectstar™ Secure Deletion Algorithm
  • Data Shredder for Solid State Drives
  • Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 , USAF AFSSI-5020 and CSEC ITSG-06.
  • 1 Year technical support
  • 11 erasing methods in total

Free Paper Shredding Events 2020 Near Me

$39.90

Military

File Shredder 2.5

  • Secure erase of files, folders and partitions
  • Secure cutting and pasting of files and directories
  • Secure erase of external devices
  • Smart secure erase wizard
  • Secure erase of temporary Windows files
  • Secure erase of temporary internet files
  • Advanced deletion logs
  • Special secure wiping algorithms for SSD & flash memory
  • Protectstar™ Secure Deletion Algorithm
  • Data Shredder for Solid State Drives
  • Enhanced military deletion methods like NATO standard, US Navy NAVSO P-5239-26 , USAF AFSSI-5020 and CSEC ITSG-06.
  • 1 Year technical support
  • 18 erasing methods in total
$59.90
Shredder

iShredder™ Windows

Compare

Shop online

Purchase your personal license in our online shop today and find the latest promotions.

Buy Now

10 Days trial

You could try iShredder™ for 10 days,
IT IS FREE!

Get trial

STOP! Don't touch that delete button! If you want to get rid of that file for good, then you'll have to do something much more severe than simply deleting it. That's right, we're going to absolutely kill that sucker by sanitizing it with a special file shredding program. You will never be able to get the file back, so use with caution.

Important Note: File shredding does not work on SSDs and will only wear the drive out faster. For more on this check out my article How Does Digital File Shredding Work?

How To Use File Shredder

There are many free programs that do what we're about to do, but for this tutorial we'll be using one called File Shredder because it's more customizable than most. Some others I would recommend are Eraser or AxCrypt. The latter is actually an encryption program but it offers a shredding function as well.

1. Download and install File Shredder

Go to FileShredder.org and click the download button at the bottom.

Run the installer after it's downloaded if it didn't start automatically. Follow the prompts to install.

2. Securely delete an individual file

  1. Right click on the file you want to delete
  2. Select File Shredder
  3. Select Secure delete files

How long it takes to erase depends on how big the file is. Small files like regular documents will be so quick you probably won't even realize it did anything special. But as long as the file disappeared, then File Shredder did its work. You can also delete more than one file at a time by selecting several at once then following the same process.

3. Use the program window to delete several files at once

Maybe you have lots of files you want to shred. It might be easier to do it in the File Shredder program window, especially if they're in different folders.

First, open the file shredder program. If it didn't put an icon on your desktop then you should be able to find it in the Start menu.

Then add all the files you want to shred. You can either drag them in from another window or click Add File(s) or Add Folder to find them. Then hold your breath and click the button that says Shred Files Now when you're ready.

File Shredder Utility

File Shredder Settings and Features

Change the shredding algorithm

The default is the DoD method which does three overwrite passes. There's really is no need to change this as the DoD method is plenty secure. But if you want, you can:

  1. Click on Shredder Settings in the main window
  2. Select the Algorithms tab
  3. Choose a different method from the drop down menu
  4. click OK

I do not suggest choosing the one- or two-pass methods. Feel free to choose from any one of the others, however.

Note: The method you choose will be the same one used when you use the right click method as described above.

Shred your hard drive's free space

If you'd like to learn more about why this is necessary, check out my tutorial on shredding your free space with CCleaner.

In the main window click Shred Free Disk Space.

Select the box for the correct drive (there's probably only one) and click Next. You can also select the erasure method here as well.

Click Start to begin the wipe.

When it reaches 100%, it will say 'Wipe finished.' You may have to scroll down the window to see it. Click the X to go back to the main window.

Very Important File Shredding Note

Moving files around can leave unseen copies behind. If you're moving a sensitive file off of a location to a new location (like from a computer to a thumb drive), you'll need to take some special steps to make sure it doesn't leave anything behind.

For example, I have a sensitive file I want to remove from my computer and put on a thumb drive. I can't just cut and paste the file. If I did, the computer would automatically delete the original file from my computer in the normal way. The original file never got shredded and is still hiding in my free space.

So what I would need to do here is copy the file to my thumb drive first so that there are two copies. One on the thumb drive and one on the hard drive. Then I'd need to manually shred the original file on my computer's hard drive. That way I'm not leaving one behind where it could be recovered.

The same principle applies when moving files between different hard drives, over the network, or any other move that causes Windows to automatically delete the original file.

When moving files around on the same hard drive this does not apply, because it does not move the actual file. It just modifies the pointer that tells the operating system where it's located.

If for some reason you think you've messed up, you can always shred your free space as a thorough measure, just to make sure nothing gets by. Conveniently, File Shredder provides that function, too.

Related Articles





broken image