pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Safely Overwrite the Deleted Files: Cipher and Eraser

Depositphotos_54207811_originalWhen someone deletes files on their PC, Windows users knew it wasn’t really gone and it can be recovered.  The deleted files are still there on your hard drive until they’re overwritten with a new data.

Using applications such as CCleaner or Eraser can truly wipe the data and give you free space to use. However, there is a built-in feature of Windows known as Cipher, it can overwrite deleted files and in the process can free up extra disk space.

 

Take Command on Windows

Using Cipher, you need to go to the command prompt to activate it. Although, the command line is not a common place computer users stay-on, Cipher has its safe feature. Thus, it’s always a good idea to back up your files before you try this.

Another thing about the command prompt,  you need to enter/type the command correctly to prevent unwanted processes.

In addition, Cipher is more than a tool to overwrite deleted data, another use of this Windows built-in tool is for encrypting data.

 

Wipe-out the Deleted Files

For Windows 8.1, you need to go to the command prompt:

  • Click the Windows key and + S, then type on the search box “command prompt”.

For Windows 7

  • Click the Start, then go to Run and type into the box “ cmd”, then click the Enter key.

 

For the standard Windows installation, you can type or copy/paste this command:

cipher /w:C

 

This command means, Windows will open the Cipher program.

The “/w”, is a switch that says to remove any data from the uncommitted disk space.

While the “c” will tell Window to process the action on C:\ drive.

 

In case your data is on a different drive, like the partition named as D:\, all you need to do is alter the letter of the drive.

 

When the procedure begins, waiting is all you can do and let Windows do its cleaning. It is advisable to do this during weekends, when you have nothing to do with your computer. The Cipher will clean your drive and free some extra disk space.

 

If you think Cipher is not for you, then there is another Windows Tool you can use, the Eraser.

 

Eraser is an open source, free safe deletion tool for Windows. This can be used easily and quickly on target files for safe deletion. You  can also use eraser to apply periodic safe deletion policies.

Features of Eraser

  • Compatible with Windows Server 2008 R2, Windows Server 2003 (with Service Pack 2), Windows Server 2008, Windows XP (with Service Pack 3), Windows Vista, and Windows 7.
  • You can use any drive for as long as it works with Windows.
  • It has a safe drive erasure technique which is ready-made software.
  • It can handle erasure of folders, files and previously deleted duplicated copies.
  • It can schedule deletion of files.

 

 

Steps How to use the Eraser in Windows Explorer

Generally, people would use Eraser via My Computer Windows Explorer programs, instead of going through the Eraser program itself.

  1. To permanently  a file, open the folder containing it.
  2. Drag the mouse pointer on this file and right-click. A pop-up menu will appear, Erase and Eraser Secure Move

Choose the Erase option, this will permanently delete the file.

  1. Now, choose the Erase item from the list menu. Notice the Easing dialog box will pop-up, confirming the task you need to perform.
  2. Click the Yes button, if the file appeared the dialog box is the file you need to permanently delete.

Be Cautioned: The file deleted will be permanent and can’t be retrieved, hence, you need to make sure that the file/s you want to delete is/are correct.

  1. Moving a file/s from one location to a different on safely (from the USB stick going to your computer), choose Eraser Secure Move.

After choosing this option, expect to answer the warning prompt as mention above to continue.

 

Wiping Unused Disk Space using Eraser

  • Go and click Start button, proceed to Program, and then go to Eraser, next select Eraser.

Advice: You can do the wiping task via schedule (with a specific time) or on-demand. This procedure may take time (about  2 to 5 hours) and may slow down your computer.

 

On-Demand Task using Eraser

  • Click the icon  next to the Eraser (On-Demand).
  • Choose File and then New Task.
  • Select the Unused space on drive option, this will clear free space on (like, Local Disk (C:))
  • Next, click the OK button to create, and then process the task displayed in the Eraser user interface.
  • Then, drag the mouse pointer on the task, and  right-click it to activate the pop-up menu.
  • Choose Run button to display the Eraser pop-up dialog box.
  • Click the Yes button, then a status window will appear while processing the request.

 

Scheduler Feature of Eraser

  • Click  icon in the main screen of Eraser menu.
  • Choose File, then New Task. This will display a window.
  • Set up this option as said in the On-Demand Task (discussed above).
  • Click the Schedule Tab, this will display the associated pane along with the two settings.
  • Choose the schedule you want on every drop-down list.
  • When done, click the OK button.

Take Note: To be able to run the scheduled task, the computer must always be switched on.

 

Remove a Task, using Eraser

Whether you run on-demand or scheduled task, the next thing to do is remove it from the task list.

  • Click the icon  on the Eraser Menu [On-Demand].
  • Choose the task you need to remove and right-click it.
  • This action will display the pop-up menu, then choose the Delete item (this will remove the task on the list, or you may click  icon just under the Eraser menu bar).

 

Removing the Scheduled Task is identical to this process.

Erase the Window Recyle Bin

  • On the Recycle Bin Icon, you can right-click it anywhere. This will activate the pop-up of Eraser menu.
  • Choose the right item listed in the pop-up menu to start erasing your Recycle Bin.

 

 

 

 

Filed Under: Articles Tagged With: Cipher, Eraser

Latest Articles

Laser printer Consumables

Most lasers use cartridge technology based on an organic photoconductive (OPC) drum, coated in light-sensitive material. During the lifetime of the printer, the drum needs to be periodically replaced as its surface wears out and print quality … [Read More...]

Bluetooth technology

Named after a tenth-century Danish king, Bluetooth is a specification for a small form-factor, low-cost radio solution providing links between mobile computers, mobile phones and other portable handheld devices, and connectivity to the … [Read More...]

Samsung Galaxy S5 – A Quick Glance

The Samsung Galaxy S5 was officially released in the market in February 2014. It is one of the most recognized Asian phones right now as it becomes comparable with the best mobile phones in the world in terms of usability and user-friendly interface. If you are familiar with the latest software on … [Read More...]

What is the Best VPN for Gamers?

Of the 44% of UK Internet users who have used a virtual private network (VPN) at some point in their lives, approximately 39% of this demographic are … [Read More...]

Think About Headless Commerce as of a Modular System

In recent years, eCommerce has transformed to where consumers no longer handle purchases on conventional websites. Shopping is currently carried out … [Read More...]

Service That Succeeds: How To Build an Effective IT Service Desk

In today’s tech-forward world, building a capable IT service team is essential for businesses hoping to scale tech-related hurdles and soar past the … [Read More...]

A simple PC guide on keeping safe while using public Wi-Fi

Did you know that there is a cyberattack every 39 seconds? You are more likely to be a victim if you are lax about your digital security. This … [Read More...]

Motivating Students to Learn Computer Science

Computer science has been an important part of the educational curriculum for decades. Professor Seymour Papert, a mathematician from South Africa … [Read More...]

AI is Driving Changes in the Field of Urban Planning

Artificial intelligence is changing many aspects of our lives. It is being used in more fields than ever before. One of the fields affected by AI … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

Removal Guide of Speedial – Browser Hijacker

Known to belong to the list of browser hijacker, Speedial, can infect your computer system through entertaining free downloads (promoted online) and … [Read More...]

4 Most Popular Alternatives to ExpressVPN

We recently wrote an article on the benefits of Express VPN. We rated it as the best VPN of 2019. However, if you aren’t feeling like using Express … [Read More...]

DVD-RAM

Rewritable DVD-ROM drives, or DVD-RAM, employs phase-change technology with some MO features mixed in … [Read More...]

[footer_backtotop]

Copyright © 2022 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors