O&O BlueCon 7 - O&O Software
O&O BlueCon 7 - O&O Software O&O BlueCon 7 - O&O Software
Selection of Deletion Method Highest Security (35 Cycles) The method that offers the highest level of security is based on a process developed by Peter Gutmann and presented in his article “Secure Deletion of Data from Magnetic and Solid-State Memory”. In this method, deleted data are overwritten by a series of 35 different deletion cycles that are executed in a random order. High Security (7 Cycles) The method for high security is based on the January 1995 'National Industrial Security Program Operating Manual' by the DoD. In this seven cycle variation (DoD 5220.22-M ECE), data is first overwritten three times with DoD 5220.22-M (E) Standards, then with a specific random value, and finally once again with DoD 5220.22-M (E). User's Guide for O&O BlueCon 7 About O&O SafeErase l 77
Moderate Security (6 Cycles) This method for moderate security conforms to the standards of the German BSI as described in the “BSI IT Baseline Protection Manual”. Data are overwritten with a random value and then with this values compliment. This procedure is completed with new random values three times. Low Security (3 Cycles) The method for low security but for high execution speed is based on the January 1995 'National Industry Security Program Operating Manual' from the DoD (US DoD 5220.22-M). The variation (DoD 5220.22-M E) offers 3 cycles in which the data are overwritten with first a set value, then its compliment, and then a random value. Lowest Security (1 Cycle) The fifth method is the fastest but offers the most limited security against unwanted data restoration. Here the data are overwritten with only a single random value in one cycle. 78 l About O&O SafeErase User's Guide for O&O BlueCon 7
- Page 31 and 32: O&O RegEditor Introduction The O&O
- Page 33 and 34: When changing values, various entry
- Page 35 and 36: Important: If you have changed pass
- Page 37 and 38: O&O DiskManager Functions The O&O D
- Page 39 and 40: O&O Prompt Introduction Command-lin
- Page 41 and 42: cd Displays the name of the current
- Page 43 and 44: deltree Deletes specified directory
- Page 45 and 46: mkdir Creates a directory or subdir
- Page 47 and 48: safeerase Securely deletes files or
- Page 49 and 50: type Displays the contents of a tex
- Page 51 and 52: O&O SystemInfo Introduction O&O Sys
- Page 53 and 54: Control Panel Functions With the Co
- Page 55 and 56: O&O Notepad Functions O&O Notepad i
- Page 57 and 58: O&O Data Recovery Suite Introductio
- Page 59 and 60: Main View The Main View in O&O UnEr
- Page 61 and 62: Searching for Deleted Files and Fol
- Page 63 and 64: 3. It is now possible to select whe
- Page 65 and 66: You may repeat the search function
- Page 67 and 68: By default, the unpartitionable are
- Page 69 and 70: Selection Data Recovery Options Run
- Page 71 and 72: Creating a Report Activating this o
- Page 73 and 74: By default, the unpartitionable are
- Page 75 and 76: Selecting Files for Restoration Aft
- Page 77 and 78: Applying a filter Selecting a Targe
- Page 79 and 80: About O&O SafeErase Introduction O&
- Page 81: Securely Erasing a Hard Disk Partit
- Page 85 and 86: • Checks image files and drives f
- Page 87 and 88: 3. You can create advanced settings
- Page 89 and 90: Important: When copying your Drive
- Page 91 and 92: O&O Support and Contact Technical S
- Page 93 and 94: This software product may only be u
- Page 95: (e) O&O is not responsible for any
Moderate Security (6 Cycles)<br />
This method for moderate security conforms to the standards of the German BSI as described<br />
in the “BSI IT Baseline Protection Manual”. Data are overwritten with a random value<br />
and then with this values compliment. This procedure is completed with new random values<br />
three times.<br />
Low Security (3 Cycles)<br />
The method for low security but for high execution speed is based on the January 1995<br />
'National Industry Security Program Operating Manual' from the DoD (US DoD 5220.22-M).<br />
The variation (DoD 5220.22-M E) offers 3 cycles in which the data are overwritten with first<br />
a set value, then its compliment, and then a random value.<br />
Lowest Security (1 Cycle)<br />
The fifth method is the fastest but offers the most limited security against unwanted data<br />
restoration. Here the data are overwritten with only a single random value in one cycle.<br />
78 l About O&O SafeErase User's Guide for O&O <strong>BlueCon</strong> 7