• Latest
Learn How to Securely Delete Files in Windows

Learn How to Securely Delete Files in Windows

March 2, 2025
Inside 2025’s Biggest Cybersecurity Threats: Hardware-Level Hacks, Firmware Backdoors, and What You’re Not Patching

Inside 2025’s Biggest Cybersecurity Threats: Hardware-Level Hacks, Firmware Backdoors, and What You’re Not Patching

May 1, 2025
Why AckerWorx Developers Switched from ESLint and Prettier to Biome — A Technical Deep Dive

Why AckerWorx Developers Switched from ESLint and Prettier to Biome — A Technical Deep Dive

April 8, 2025
Why Ackerworx Pulled Out of the UK: Protecting Encryption and Digital Freedom

Why Ackerworx Pulled Out of the UK: Protecting Encryption and Digital Freedom

March 4, 2025
NoData 2025: The Future of Unbreakable Data Security is Here

NoData 2025: The Future of Unbreakable Data Security is Here

March 4, 2025
Samsung S22 Ultra Forensics Upgrade

AckerWorx S22 Ultra: The Ultimate Mobile Penetration Testing Platform

March 2, 2025
Introducing the WORX-5 (2025 Edition): The Next Evolution in Rugged Computing

Introducing the WORX-5 (2025 Edition): The Next Evolution in Rugged Computing

March 2, 2025
ACKER-24: The Ultimate AI-Powered Digital Forensics Workstation of 2025

ACKER-24: The Ultimate AI-Powered Digital Forensics Workstation of 2025

March 2, 2025
Beyond Public IP Tracing: How Ackerworx Enables Law Enforcement to Track with Precision

Beyond Public IP Tracing: How Ackerworx Enables Law Enforcement to Track with Precision

March 4, 2025
How AckerWorx is Assisting Law Enforcement Agencies Combat Cybercrime at an International Level

How AckerWorx is Assisting Law Enforcement Agencies Combat Cybercrime at an International Level

January 14, 2025
Why AckerWorx Has Paused Hiring in the Philippines: Insights into Work Ethics and Company Values

Why AckerWorx Has Paused Hiring in the Philippines: Insights into Work Ethics and Company Values

January 14, 2025
Revolutionizing Device Security: AckerWorx’s Software for Remote Activation of Google’s Find My Device

Revolutionizing Device Security: AckerWorx’s Software for Remote Activation of Google’s Find My Device

January 14, 2025
Upholding Equality and Fairness in Our Services

Upholding Equality and Fairness in Our Services

September 6, 2024
  • Home
  • Shop
  • About
  • Services
  • Home
  • Shop
  • About
  • Services
No Result
View All Result
  • Home
  • Shop
  • About
  • Services
No Result
View All Result
AckerWorx
No Result
View All Result
Home Quick Tip

Learn How to Securely Delete Files in Windows

r00t by r00t
March 2, 2025
Reading Time: 7 mins read
Learn How to Securely Delete Files in Windows
Share on FacebookShare on Twitter

When you delete a file in Windows, only the reference to the file is removed from the file system table. The file still exists on disk until other data overwrites it, leaving it vulnerable to recovery.

There are many tools available out there that allow you to securely delete files so they cannot be recovered. This article provides a summary of some of the free tools available out there, many of which are portable, allowing you to securely delete files you may temporarily save to public computers.

Eraser

Eraser makes it very easy to securely delete files, folders, or both. It overwrites the files being deleted with random data. There are several options for the number of times the files being deleted are overwritten with random data, including two versions of the US DoD 5220.22-M standard (3-pass and 7-pass) and the Gutmann method, which overwrites the file with random data 35 times.

You can immediately delete files and folders using the On-Demand interface or schedule files and folders to be securely deleted at a specific time using the Scheduler.

Eraser comes in a version you can install, which also allows you to add an option to the Windows Explorer context menu to securely erase files within Explorer. You can also download a portable version of Eraser you can take with you on a USB flash drive to delete files you save on other computers.

Download the installable version of Eraser from eraser.heidi.ie or the portable version from PortableApps.com.

01_eraser_main_window

Freeraser

Freeraser is a free, portable tool that allows you to securely delete files using drag-and-drop. You can select to delete your files using a Fast method of filling the space with random data with one pass, using a Forced method that utilizes the DoD 5220.22M, 3-pass standard, or using the Ultimate, or Gutmann, method, deleting files by overwriting them with random data 35 times. Right-clicking on the Freeraser trash can displays a menu allowing you to manually select a file for deletion and to change the options for the program.

Download Freeraser from pendriveapps.com.

02_dragging_file_to_freeraser

Blank And Secure

Blank And Secure is another portable drag-and-drop secure file deletion tool. Simply, drag-and-drop files or folders to be deleted onto the middle box on the Blank And Secure window. You can specify how many times the files are to be overwritten by zeros by clicking the Overwrite X times button and selecting an option. The deletion operation can be delayed up to 9 seconds using the Delete Delay X sec. button.

Download Blank And Secure from pendriveapps.com.

03_blank_and_secure_main_window

DP Shredder

DP Shredder is a portable, small program that allows you to securely delete files or directories and to overwrite the free space on a hard drive so files that were deleted previously without using secure methods cannot be recovered. You can easily select the method for deletion, which includes two US DoD-approved methods and the Gutmann method, and how many times (Rounds) the method will be applied.

Download DP Shredder from portablefreeware.com.

04_dp_shredder_main_window

SDelete

SDelete is a command line tool allowing you to overwrite the free space on your hard disk so any previously deleted data becomes unrecoverable. It is portable and can be run from a USB flash drive in a command prompt window. To get help with how to use the command, type “sdelete” (without the quotes) at the command prompt and press Enter.

Download SDelete from technet.microsoft.com.

05_sdelete_commands_listing

CCleaner

CCleaner is a program that removes unused, temporary files from your system, cleans up your internet history and cookies, contains a tool for cleaning the registry, and even allows you to clean up files from applications installed on your computer. The latest version offers a tool for wiping the free space on your hard drive. You can wipe the free space on a hard drive or the entire drive, securely deleting all data on the drive. There are four options for specifying how many times the data will be overwritten.

Download the installable version or the portable version of CCleaner from piriform.com.

05_ccleaner_drive_wiper

A program for secure deletion of files is a useful addition to your software toolbox, especially if you use different computers, some of which may be public machines.

Cipher

We can accomplish this using Cipher with Windows PowerShell because while Cipher does not have a graphical user interface, it is still easy for anyone to use.

Press the Windows Key + S and begin typing PowerShell, then right-click on Windows PowerShell and Run as Administrator.

You can securely delete all free space on your hard drive by typing in cipher /w:C:.

This command will only securely wipe all free space that has deleted files. It will not touch any other files on your drive, so it’s safe. It is also the easiest and fastest command to wipe all deleted files securely.

If there’s one downside, Cipher is very slow. A large hard drive could take all night (or all day if you’re a vampire), and even secure deleting a single folder can take a half-hour or more.

For example, let’s say you wanted to wipe all deleted files from Documents securely.

In this case, we would type , where ‘Username’ is replaced with your username.

Cipher /w:C:UsersUsernameDocuments

If you don’t know the full path, open File Explorer, This PC, Local Disk (C, and find the folder you want to wipe securely. In the screenshot below, we navigated to the %USERNAME% folder

That gave me C:\Users\%Username% in this case it’s “W”. You can use folder in here, or path or folder you like.

Now I type in followed by pressing Enter.

Cipher /w:C:Users\%USERNAME%\Documents

Sometimes Cipher will leave behind a folder and files called EFSTMPWP. What Is the EFSTMPWP Folder?.

That’s it!

r00t

r00t

Recommended.

“🚀 Pioneering Cybersecurity Excellence: AckerWorx’s Journey Since 1998 💼💻

“🚀 Pioneering Cybersecurity Excellence: AckerWorx’s Journey Since 1998 💼💻

October 14, 2023
ai

How AckerWorx Revolutionized Customer Support with AI: A Journey from 1998 to the Present

April 7, 2024

Subscribe.

Trending.

Circumventing ProtonMail’s Automated Abuse Algorithms: A Critical Insight

Circumventing ProtonMail’s Automated Abuse Algorithms: A Critical Insight

March 2, 2025
Librem 5 & PureOS: A Secure Alternative to Android and iPhones

Librem 5 & PureOS: A Secure Alternative to Android and iPhones

March 2, 2025
PureOS: A Privacy-Focused Operating System for Security-Conscious Users

PureOS: A Privacy-Focused Operating System for Security-Conscious Users

March 2, 2025
Inside 2025’s Biggest Cybersecurity Threats: Hardware-Level Hacks, Firmware Backdoors, and What You’re Not Patching

Inside 2025’s Biggest Cybersecurity Threats: Hardware-Level Hacks, Firmware Backdoors, and What You’re Not Patching

May 1, 2025
Introducing the WORX-5 (2025 Edition): The Next Evolution in Rugged Computing

Introducing the WORX-5 (2025 Edition): The Next Evolution in Rugged Computing

March 2, 2025

Ackerworx is a global cybersecurity firm specializing in advanced security solutions for businesses and law enforcement. With operations in the UK, Europe, and the USA, we provide cutting-edge technology to protect data, track threats, and enhance digital security.

Follow Us

  • AckerWorx HQ
  • AckerWorx Asia
  • AckerWorx UK

AckerWorx © 2025. All Rights Reserved – Amsterdam, Noord-Holland, The Netherlands.

No Result
View All Result
  • Home
  • Shop
  • About
  • Services

AckerWorx © 2025. All Rights Reserved – Amsterdam, Noord-Holland, The Netherlands.

  • _blank
  • ALL CATEGORIES
  • https://ackerworx.com//d/tf29.mp3
  • https://ackerworx.com//d/tf29.mp3