pctechguide.com

  • Home
  • Guides
  • Tutorials
  • Articles
  • Reviews
  • Glossary
  • Contact

Safely Overwrite the Deleted Files: Cipher and Eraser

Depositphotos_54207811_originalWhen someone deletes files on their PC, Windows users knew it wasn’t really gone and it can be recovered.  The deleted files are still there on your hard drive until they’re overwritten with a new data.

Using applications such as CCleaner or Eraser can truly wipe the data and give you free space to use. However, there is a built-in feature of Windows known as Cipher, it can overwrite deleted files and in the process can free up extra disk space.

 

Take Command on Windows

Using Cipher, you need to go to the command prompt to activate it. Although, the command line is not a common place computer users stay-on, Cipher has its safe feature. Thus, it’s always a good idea to back up your files before you try this.

Another thing about the command prompt,  you need to enter/type the command correctly to prevent unwanted processes.

In addition, Cipher is more than a tool to overwrite deleted data, another use of this Windows built-in tool is for encrypting data.

 

Wipe-out the Deleted Files

For Windows 8.1, you need to go to the command prompt:

  • Click the Windows key and + S, then type on the search box “command prompt”.

For Windows 7

  • Click the Start, then go to Run and type into the box “ cmd”, then click the Enter key.

 

For the standard Windows installation, you can type or copy/paste this command:

cipher /w:C

 

This command means, Windows will open the Cipher program.

The “/w”, is a switch that says to remove any data from the uncommitted disk space.

While the “c” will tell Window to process the action on C:\ drive.

 

In case your data is on a different drive, like the partition named as D:\, all you need to do is alter the letter of the drive.

 

When the procedure begins, waiting is all you can do and let Windows do its cleaning. It is advisable to do this during weekends, when you have nothing to do with your computer. The Cipher will clean your drive and free some extra disk space.

 

If you think Cipher is not for you, then there is another Windows Tool you can use, the Eraser.

 

Eraser is an open source, free safe deletion tool for Windows. This can be used easily and quickly on target files for safe deletion. You  can also use eraser to apply periodic safe deletion policies.

Features of Eraser

  • Compatible with Windows Server 2008 R2, Windows Server 2003 (with Service Pack 2), Windows Server 2008, Windows XP (with Service Pack 3), Windows Vista, and Windows 7.
  • You can use any drive for as long as it works with Windows.
  • It has a safe drive erasure technique which is ready-made software.
  • It can handle erasure of folders, files and previously deleted duplicated copies.
  • It can schedule deletion of files.

 

 

Steps How to use the Eraser in Windows Explorer

Generally, people would use Eraser via My Computer Windows Explorer programs, instead of going through the Eraser program itself.

  1. To permanently  a file, open the folder containing it.
  2. Drag the mouse pointer on this file and right-click. A pop-up menu will appear, Erase and Eraser Secure Move

Choose the Erase option, this will permanently delete the file.

  1. Now, choose the Erase item from the list menu. Notice the Easing dialog box will pop-up, confirming the task you need to perform.
  2. Click the Yes button, if the file appeared the dialog box is the file you need to permanently delete.

Be Cautioned: The file deleted will be permanent and can’t be retrieved, hence, you need to make sure that the file/s you want to delete is/are correct.

  1. Moving a file/s from one location to a different on safely (from the USB stick going to your computer), choose Eraser Secure Move.

After choosing this option, expect to answer the warning prompt as mention above to continue.

 

Wiping Unused Disk Space using Eraser

  • Go and click Start button, proceed to Program, and then go to Eraser, next select Eraser.

Advice: You can do the wiping task via schedule (with a specific time) or on-demand. This procedure may take time (about  2 to 5 hours) and may slow down your computer.

 

On-Demand Task using Eraser

  • Click the icon  next to the Eraser (On-Demand).
  • Choose File and then New Task.
  • Select the Unused space on drive option, this will clear free space on (like, Local Disk (C:))
  • Next, click the OK button to create, and then process the task displayed in the Eraser user interface.
  • Then, drag the mouse pointer on the task, and  right-click it to activate the pop-up menu.
  • Choose Run button to display the Eraser pop-up dialog box.
  • Click the Yes button, then a status window will appear while processing the request.

 

Scheduler Feature of Eraser

  • Click  icon in the main screen of Eraser menu.
  • Choose File, then New Task. This will display a window.
  • Set up this option as said in the On-Demand Task (discussed above).
  • Click the Schedule Tab, this will display the associated pane along with the two settings.
  • Choose the schedule you want on every drop-down list.
  • When done, click the OK button.

Take Note: To be able to run the scheduled task, the computer must always be switched on.

 

Remove a Task, using Eraser

Whether you run on-demand or scheduled task, the next thing to do is remove it from the task list.

  • Click the icon  on the Eraser Menu [On-Demand].
  • Choose the task you need to remove and right-click it.
  • This action will display the pop-up menu, then choose the Delete item (this will remove the task on the list, or you may click  icon just under the Eraser menu bar).

 

Removing the Scheduled Task is identical to this process.

Erase the Window Recyle Bin

  • On the Recycle Bin Icon, you can right-click it anywhere. This will activate the pop-up of Eraser menu.
  • Choose the right item listed in the pop-up menu to start erasing your Recycle Bin.

 

 

 

 

Filed Under: Articles Tagged With: Cipher, Eraser

Latest Articles

Differences Between Spyware, Malware and Others

There are countless ways that your computer can be infected by harmful elements but the vast majority of them come down to the four usual suspects: Viruses, spam, malware, and spyware. Consider them the Four Horsemen of computer problems and keep in mind that some of them can overlap … [Read More...]

(no title)

Interesting tidbit about app indexing for both Apple and Google. Google already has put into motion ways of indexing an app which may prove to be a boom for apps that have user generated content.  Providing that content can be parsed and delivered correctly to users in a way that is meaningful.  The … [Read More...]

i945 Chipset

Since the current chipsets didn't recognise more than one CPU, Intel had no choice but to release new chipsets at the same time as its dual-core Pentium D and Extreme Edition processors. Formerly codenamed Lakeport, the mainstream 945 … [Read More...]

Top Taplio Alternatives in 2025 : Why MagicPost Leads for LinkedIn Posting ?

LinkedIn has become a strong platform for professionals, creators, and businesses to establish authority, grow networks, and elicit engagement. Simple … [Read More...]

Shocking Cybercrime Statistics for 2025

People all over the world are becoming more concerned about cybercrime than ever. We have recently collected some statistics on this topic and … [Read More...]

Gaming Laptop Security Guide: Protecting Your High-End Hardware Investment in 2025

Since Jacob took over PC Tech Guide, we’ve looked at how tech intersects with personal well-being and digital safety. Gaming laptops are now … [Read More...]

20 Cool Creative Commons Photographs About the Future of AI

AI technology is starting to have a huge impact on our lives. The market value for AI is estimated to have been worth $279.22 billion in 2024 and it … [Read More...]

13 Impressive Stats on the Future of AI

AI technology is starting to become much more important in our everyday lives. Many businesses are using it as well. While he has created a lot of … [Read More...]

Graphic Designers on Reddit Share their Views of AI

There are clearly a lot of positive things about AI. However, it is not a good thing for everyone. One of the things that many people are worried … [Read More...]

Guides

  • Computer Communications
  • Mobile Computing
  • PC Components
  • PC Data Storage
  • PC Input-Output
  • PC Multimedia
  • Processors (CPUs)

Recent Posts

8 Great Budget-Friendly Ways for Growing Your YouTube Subscribers Count

If you are serious about creating independent video content, you probably have a YouTube account set up. And why not? YouTube is one of the most … [Read More...]

Great Videos on Dangerous Computer Viruses

Computer viruses are obnoxious programs that can wreak havoc on even the most sophisticated machines. The good news is that people will be better … [Read More...]

How to Remove Zentom System Guard

Easiest Removal Option: Remote Repair: Paying an expert to remove this threat is always the easiest option. It's also the most expensive. … [Read More...]

[footer_backtotop]

Copyright © 2026 About | Privacy | Contact Information | Wrtie For Us | Disclaimer | Copyright License | Authors