pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Safely Overwrite the Deleted Files: Cipher and Eraser

Depositphotos_54207811_originalWhen someone deletes files on their PC, Windows users knew it wasn’t really gone and it can be recovered.  The deleted files are still there on your hard drive until they’re overwritten with a new data.

Using applications such as CCleaner or Eraser can truly wipe the data and give you free space to use. However, there is a built-in feature of Windows known as Cipher, it can overwrite deleted files and in the process can free up extra disk space.

 

Take Command on Windows

Using Cipher, you need to go to the command prompt to activate it. Although, the command line is not a common place computer users stay-on, Cipher has its safe feature. Thus, it’s always a good idea to back up your files before you try this.

Another thing about the command prompt,  you need to enter/type the command correctly to prevent unwanted processes.

In addition, Cipher is more than a tool to overwrite deleted data, another use of this Windows built-in tool is for encrypting data.

 

Wipe-out the Deleted Files

For Windows 8.1, you need to go to the command prompt:

  • Click the Windows key and + S, then type on the search box “command prompt”.

For Windows 7

  • Click the Start, then go to Run and type into the box “ cmd”, then click the Enter key.

 

For the standard Windows installation, you can type or copy/paste this command:

cipher /w:C

 

This command means, Windows will open the Cipher program.

The “/w”, is a switch that says to remove any data from the uncommitted disk space.

While the “c” will tell Window to process the action on C:\ drive.

 

In case your data is on a different drive, like the partition named as D:\, all you need to do is alter the letter of the drive.

 

When the procedure begins, waiting is all you can do and let Windows do its cleaning. It is advisable to do this during weekends, when you have nothing to do with your computer. The Cipher will clean your drive and free some extra disk space.

 

If you think Cipher is not for you, then there is another Windows Tool you can use, the Eraser.

 

Eraser is an open source, free safe deletion tool for Windows. This can be used easily and quickly on target files for safe deletion. You  can also use eraser to apply periodic safe deletion policies.

Features of Eraser

  • Compatible with Windows Server 2008 R2, Windows Server 2003 (with Service Pack 2), Windows Server 2008, Windows XP (with Service Pack 3), Windows Vista, and Windows 7.
  • You can use any drive for as long as it works with Windows.
  • It has a safe drive erasure technique which is ready-made software.
  • It can handle erasure of folders, files and previously deleted duplicated copies.
  • It can schedule deletion of files.

 

 

Steps How to use the Eraser in Windows Explorer

Generally, people would use Eraser via My Computer Windows Explorer programs, instead of going through the Eraser program itself.

  1. To permanently  a file, open the folder containing it.
  2. Drag the mouse pointer on this file and right-click. A pop-up menu will appear, Erase and Eraser Secure Move

Choose the Erase option, this will permanently delete the file.

  1. Now, choose the Erase item from the list menu. Notice the Easing dialog box will pop-up, confirming the task you need to perform.
  2. Click the Yes button, if the file appeared the dialog box is the file you need to permanently delete.

Be Cautioned: The file deleted will be permanent and can’t be retrieved, hence, you need to make sure that the file/s you want to delete is/are correct.

  1. Moving a file/s from one location to a different on safely (from the USB stick going to your computer), choose Eraser Secure Move.

After choosing this option, expect to answer the warning prompt as mention above to continue.

 

Wiping Unused Disk Space using Eraser

  • Go and click Start button, proceed to Program, and then go to Eraser, next select Eraser.

Advice: You can do the wiping task via schedule (with a specific time) or on-demand. This procedure may take time (about  2 to 5 hours) and may slow down your computer.

 

On-Demand Task using Eraser

  • Click the icon  next to the Eraser (On-Demand).
  • Choose File and then New Task.
  • Select the Unused space on drive option, this will clear free space on (like, Local Disk (C:))
  • Next, click the OK button to create, and then process the task displayed in the Eraser user interface.
  • Then, drag the mouse pointer on the task, and  right-click it to activate the pop-up menu.
  • Choose Run button to display the Eraser pop-up dialog box.
  • Click the Yes button, then a status window will appear while processing the request.

 

Scheduler Feature of Eraser

  • Click  icon in the main screen of Eraser menu.
  • Choose File, then New Task. This will display a window.
  • Set up this option as said in the On-Demand Task (discussed above).
  • Click the Schedule Tab, this will display the associated pane along with the two settings.
  • Choose the schedule you want on every drop-down list.
  • When done, click the OK button.

Take Note: To be able to run the scheduled task, the computer must always be switched on.

 

Remove a Task, using Eraser

Whether you run on-demand or scheduled task, the next thing to do is remove it from the task list.

  • Click the icon  on the Eraser Menu [On-Demand].
  • Choose the task you need to remove and right-click it.
  • This action will display the pop-up menu, then choose the Delete item (this will remove the task on the list, or you may click  icon just under the Eraser menu bar).

 

Removing the Scheduled Task is identical to this process.

Erase the Window Recyle Bin

  • On the Recycle Bin Icon, you can right-click it anywhere. This will activate the pop-up of Eraser menu.
  • Choose the right item listed in the pop-up menu to start erasing your Recycle Bin.

 

 

 

 

Filed Under: Articles Tagged With: Cipher, Eraser

Latest Articles

Technological Breakthroughs Could Spare Millions from COVID-19

Computer technology has helped society conquer countless challenges over the last 40 years. The most recent problem computers have played a role in addressing is the COVID-19 pandemic. Policymakers and health experts have recognized the growing importance of computer technology in minimizing the … [Read More...]

UI Regression Testing as a Tool to Build a User-Friendly Product

Developing a new product, whether it is an application or an online website, is a quite challenging task, which requires a well-planned and structured approach and in-depth preparation from the entire team. You can invest a lot of money in a new project but get negative reviews and sales decline. … [Read More...]

How To Create A Windows Start Up Disk

You're going to need a Windows 98 Startup Disk to partition and format your PC's hard drive and then to provide CD-ROM support for the re-installation of Windows 98 itself. This is a bootable system disk that supports the FAT32 file system and contains a collection of real-mode Windows 98 commands … [Read More...]

Best Laptops for Professional Writers in 2023

If you need a new laptop as a writer, you may find yourself bewildered by all the choices. For one thing, there are so many brands to choose from. … [Read More...]

What You Need to Know About Automation with Chrome

Automation is drastically changing the way we interact with the Internet. One survey found that 76% of businesses use automation to streamline … [Read More...]

9 Steps to Take When Building a Web Scraper in Python

Web scraping is a method for collecting, organizing and analyzing information that is spread over the Internet in a disorganized way. It can … [Read More...]

8 Steps To Streamline Your Business Operations with Virtual Data Rooms

With the increased reliance on networking and cloud computing, businesses generate and store an ever-increasing amount of sensitive information. As a … [Read More...]

Advantages and disadvantages of using Perl in web programming

Web pages are designed using programming codes and a number of technologies as tools to achieve the desired objectives. An example of the above … [Read More...]

Why Cross-Chain Trading Is the Future of Crypto Investing?

The rapid growth and evolution of the cryptocurrency market have opened up exciting opportunities for investors. Within this dynamic landscape, … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

24p Digital Video

The fact that the frequency of AC power - 50Hz in Europe and 60Hz in the USA - was used to lock video frames in each of … [Read More...]

External keyboards for mobile computers

A step towards Toshiba's vision was made in late 2000 with the unveiling of the world's first fabric keyboard, designed for use with devices such … [Read More...]

Is Your Smart Home Safe from Hackers?

Internet of Things (IoT) devices are growing in popularity, with the most common smart home gadgets including those in the entertainment category, … [Read More...]

[footer_backtotop]

Copyright © 2023 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors