17.04.2015 Views

O&O BlueCon 7 - O&O Software

O&O BlueCon 7 - O&O Software

O&O BlueCon 7 - O&O Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Selection of Deletion Method<br />

Highest Security (35 Cycles)<br />

The method that offers the highest level of security is based on a process developed by<br />

Peter Gutmann and presented in his article “Secure Deletion of Data from Magnetic and Solid-State<br />

Memory”. In this method, deleted data are overwritten by a series of 35 different<br />

deletion cycles that are executed in a random order.<br />

High Security (7 Cycles)<br />

The method for high security is based on the January 1995 'National Industrial Security<br />

Program Operating Manual' by the DoD. In this seven cycle variation (DoD 5220.22-M ECE),<br />

data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific<br />

random value, and finally once again with DoD 5220.22-M (E).<br />

User's Guide for O&O <strong>BlueCon</strong> 7<br />

About O&O SafeErase l 77

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!