Logo by Liksmaskaren (anonymous IP: 3.15.211.41,2258) | ||||||||||||||
| ||||||||||||||
Audio (343) Datatype (51) Demo (203) Development (602) Document (24) Driver (97) Emulation (149) Game (1011) Graphics (500) Library (118) Network (234) Office (66) Utility (932) Video (69) Total files: 4399 Full index file Recent index file
Amigans.net OpenAmiga Aminet IntuitionBase
Support the site
|
Description =========== The progam is used to remove serious files from harddisk... Features ======== - Easy to handle - Fully asyncron, can be aborted at any time - Supports different erase-methods: - US standard, DoD 5220.22-M (E) - US standard, DoD 5220.22-M (ECE) - German standard, VSITR - Bruce Schneier - Rupert Hausberger 15 - Rupert Hausberger 30 - Error report system Requirements ============ - AmigaOS 4.x, info.datatype - NList classes Installation ============ Installation is very simple. Just drag the rhErase-drawer where you like, it does not need assigns. Usage ===== After the start go to the 'Settings' tab and select your prefered erase-menthod: - US standard, DoD 5220.22-M (E) Based on 'National Industrial Security Program Operating Manual' (NISPOM) of the NSA from January 1995, this delete algorithm uses three write runs: 1. overwrite with fixed values 2. overwrite with random values 3. overwrites with the complement value of the first run This is the most common algorithm, which one finds in almost any erase-tool. In the regulations NTSC-TG-025 of the US-american ministry of defense expressly it is pointed out that the deletion of information with the military classification is not permitted 'secret' or 'top Secret' to with this procedure. For the use at home however, it is surely sufficiently. - US standard, DoD 5220.22-M (ECE) This is a variant of the DoD 5220.22-M with seven runs, whereby the data are overwritten again first with the three runs of the DoD 5220.22-M (E) standard, afterwards with a random value, afterwards with the three runs of the DoD 5220.22-M (E) - German standard, VSITR With the VSITR standard, given change of the Federal Office for security in the information technology (BSI), the data which can be deleted are overwritten with altogether seven runs in the first six runs alternating with the values 0x00 and 0xFF and in the last run with the value 0xAA. - Bruce Schneier The delete algorithm of Bruce Schneier, which he presented in it's book 'Applied Cryptography', overwrites all data with the value 0xFF in the first run in the second 0x00 and in five runs with cryptographic 'safe' random values following on it. - Rupert Hausberger 15 This is a algorithm from the author of this tool. In the first step 0xff is written then a random value and then 0x00. This is cyced 5 times, so thats 15 runs. - Rupert Hausberger 30 This is a algorithm from the author of this tool. In the first step 0xff is written then a random value and then 0x00. This is cyced 10 times, so thats 30 runs. Now select files and press the 'Erase' button... NOTE: If you select a directory, all dirs and subdirs will be erased too! Author ====== ©2005-2012 Rupert Hausberger <natmeg()gmx.net> http://natmeg.mooo.com/ Copyrights ========== NList : ©2001-2012 NList Open Source Team http://www.sourceforge.net/projects/nlist-classes/ Mersenne Twister : ©1997 Makoto Matsumoto License ======= GPL. Please refer to the file COPYING for details. History ======= Please refer to the file ChangeLog for details. |
Copyright © 2004-2024 by Björn Hagström All Rights Reserved |