VPNCity Blog
POPULAR
  • Transparency Report
No Result
View All Result
  • Pricing
  • Servers
  • What is a VPN?
  • Download VPN
    • Windows
    • Android
    • MacOS
    • iOS
    • Android TV
    • Fire TV Stick
    • Chrome Extension
    • Firefox Extension
    • ShadowSocks
  • Blog
  • Setup Guides
    • Windows
    • MacOS
    • Linux
    • Android
    • iOS
    • Gaming Consoles
    • Raspberry Pi
  • Login
VPNCity Blog
  • Pricing
  • Servers
  • What is a VPN?
  • Download VPN
    • Windows
    • Android
    • MacOS
    • iOS
    • Android TV
    • Fire TV Stick
    • Chrome Extension
    • Firefox Extension
    • ShadowSocks
  • Blog
  • Setup Guides
    • Windows
    • MacOS
    • Linux
    • Android
    • iOS
    • Gaming Consoles
    • Raspberry Pi
  • Login
No Result
View All Result
VPNCity Blog
No Result
View All Result

Best Practices: Deleting Files

12/04/2022
in How To
4 min read
0
Best Practices: Deleting Files

This is part of the VPNCity Best Practices articles where we will explain along the way the “What”, “How” and “Why” the best practices will improve your security and privacy in your day-to-day life while helping you understand the technology, dispel the myths and give you the tools to understand why your personal privacy and security is in your hands. This part concentrates on how to securely delete files so they cannot be recovered.

When you delete a file on a computer, only the reference to the file is removed from the file system table. The file still exists on a disk until other data overwrites it, leaving it vulnerable to recovery. 

There are many tools available out there that allow you to securely delete files so they cannot be recovered. This article provides a summary of some of the free tools available out there, many of which are portable, allowing you to securely delete files you may temporarily save to public computers. 

Secure Erase on Windows 

Eraser 

  • Developer: Heidi 
  • Open Source: Yes 
  • Cost: Free 

Eraser makes it very easy to securely delete files, folders, or both. It overwrites the files being deleted with random data. There are several options for the number of times the files being deleted are overwritten with random data, including two versions of the US DoD 5220.22-M standard (3-pass and 7-pass) and the Gutmann method, which overwrites the file with random data 35 times. 

You can immediately delete files and folders using the On-Demand interface or schedule files and folders to be securely deleted at a specific time using the Scheduler. 

Eraser comes in a version you can install, which also allows you to add an option to the Windows Explorer context menu to securely erase files within Explorer. You can also download a portable version of Eraser you can take with you on a USB flash drive to delete files you save on other computers. 

Download the installable version of Eraser from eraser.heidi.ie or the portable version from PortableApps.com. 

Secure Erase on MacOS 

Apple users have a native secure delete built into the operating system, however, the actual Secure Empty Trash was removed in MacOS v10.6.8 and later. That said, however, you can still securely remove files and overwrite them with null data.

On MacOS, you can use a command called srm, which can “securely remove files or directories.” To do this follow these steps 

  1. Open Terminal (go to Finder > Applications > Utilities); it’s in the Utility folder in your Applications folder,  
  2. Type the following command: srm -v 
  3. Type space after the above command.  
  4. Drag the file that you want to delete into the Terminal window; you’ll see that Terminal adds its file path.  
  5. Press Return and the file will be securely deleted. If the file is very large, this may take a while. 

If you want to delete a folder, then use the command: srm -rv 

Secure Erase on Linux 

On Linux, you can use a series of commands to overwrite deleted data with 0’s or random data, which can securely remove files or directories. To do this, follow these steps 

  1. Open Terminal
  2. Type the following commands (if using a SSD):
    1. rm <file to delete>
    2. cat /dev/zero > zeros
    3. sudo sync
    4. rm zeros
  3. Type the following commands (if using a HDD):
    1. rm <file to delete>
    2. cat /dev/urandom > randomdata
    3. sudo sync
    4. rm randomdata

However, this instructions will not delete other copies of any file that had previously been written to other parts of your disk. 

Related Posts

Best Practices: Encryption
How To

Best Practices: Encryption

26/04/2022
Best Practices: Browsers
How To

Best Practices: Browsers

12/04/2022
Best Practices: Two Factor Authentication (2FA)
How To

Best Practices: Two Factor Authentication (2FA)

12/04/2022
Best Practices: Passwords
How To

Best Practices: Passwords

05/04/2022
Best Practices: The Essential Toolbox to Online Life
How To

Best Practices: The Essential Toolbox to Online Life

12/04/2022
Best Practices: Biometrics
How To

Best Practices: Biometrics

12/04/2022
Load More
Next Post
Best Practices: Encryption

Best Practices: Encryption

Transparency Report

Transparency Report: April 2022

Recommended

How to Watch Disney+ from Anywhere in the World with VPNCity

How to Watch Disney+ from Anywhere in the World with VPNCity

08/03/2022
Best Practices: Passwords

Best Practices: Passwords

05/04/2022

What is Easy Firewall Traversal?

10/03/2022
public Wi-Fi

How to stay safe on public WiFi using a VPN

08/03/2022

VPNCity

  • Home
  • Pricing
  • Server locations
  • What is a VPN?
  • Contact Us

Apps

  • Windows VPN
  • Android VPN
  • iOS VPN
  • Chrome VPN
  • Firefox VPN

Info

  • How-To Guides
  • Terms of Service
  • Privacy Policy
  • Warrant Canary
  • Reviews

Account

  • Login
  • Affiliates
  • Refer a friend
  • VPN for Business

Download our Apps

Copyright © 2012 – 2022 VPNCity, All rights reserved.

No Result
View All Result
  • Pricing
  • Servers
  • What is a VPN?
  • Download VPN
    • Windows
    • Android
    • MacOS
    • iOS
    • Android TV
    • Fire TV Stick
    • Chrome Extension
    • Firefox Extension
    • ShadowSocks
  • Blog
  • Setup Guides
    • Windows
    • MacOS
    • Linux
    • Android
    • iOS
    • Gaming Consoles
    • Raspberry Pi
  • Login