User's Manual

Table Of Contents
181 Copyright © Acronis International GmbH, 2003-2020
If required, you can dig deeper by expanding a component and selecting/unselecting its contents.
Having specified the components for clean-up, click the Clean-up button to continue.
Windows 7 and later operating systems do not store information on file and computer searches. Furthermore,
information on opened/saved files is stored in the registry differently, so the wizard shows this information in a
different way.
11.7.2.5 Clean-up progress
The operation status window reports about the state of the current operation.
The progress bar indicates the level of completion of the selected operation.
In some cases, the operation may take a long time to be completed. If this is the case, select the
Shutdown the computer after completion check box. When the operation finishes, Acronis True
Image 2021 will turn the computer off.
11.7.3 Hard Disk Wiping methods
What is the problem?
Information removed from a hard disk drive by non-secure means (for example, by simple Windows
delete) can easily be recovered. Utilizing specialized equipment, it is possible to recover even
repeatedly overwritten information.
Leakage mechanism
Data is stored on a hard disk as a binary sequence of 1 and 0 (ones and zeros), represented by
differently magnetized parts of a disk.
Generally speaking, a 1 written to a hard disk is read as 1 by its controller, and 0 is read as 0.
However, if you write 1 over 0, the result is conditionally 0.95 and vice versa if 1 is written over 1
the result is 1.05. These differences are irrelevant for the controller. However, using special
equipment, one can easily read the «underlying» sequence of 1's and 0's.
Information wiping methods used by Acronis
The detailed theory of guaranteed information wiping is described in an article by Peter Gutmann.
Please see "Secure Deletion of Data from Magnetic and Solid-State Memory" at
https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html.
No.
Algorithm (writing method)
Passes
Record
1.
United States Department of
Defense 5220.22-M
4
1
st
pass randomly selected symbols to each byte of
each sector, 2 complementary to written during the
1
st
pass; 3 random symbols again; 4 writing
verification.
2.
United States: NAVSO
P-5239-26 (RLL)
4
1
st
pass 0x01 to all sectors, 2 0x27FFFFFF, 3
random symbol sequences, 4 verification.
3.
United States: NAVSO
P-5239-26 (MFM)
4
1
st
pass 0x01 to all sectors, 2 0x7FFFFFFF, 3
random symbol sequences, 4 verification.
4.
German: VSITR
7
1
st
6
th
alternate sequences of: 0x00 and 0xFF; 7
th
0xAA; i.e. 0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, 0xAA.
5.
Russian: GOST P50739-95
1
Logical zeros (0x00 numbers) to each byte of each