11 Personal
16
Copyright© 1994-2011 Paragon Software Group. All rights reserved.
6. Russian GOST R 50739-95. Destroy information by a single pass with writing random characters into each sector
byte;
7. Peter Gutmann's algorithm. A whopping 35 passes, with 27 random-order passes using specific patterns
combined with eight passes using random patterns;
8. Bruce Schneier's algorithm. Two passes of specific patterns followed by five passes using a cryptographically
secure pseudo-random sequence;
9. Paragon's algorithm.
Overwrite each sector with a forcefully randomized 512-byte string, new for each sector, using CSPRNG
(cryptographically secure pseudo-random number generator);
Overwrite each erased sector with its complement;
Overwrite each sector with a 512-byte string (CSPRNG), again forcefully randomized and different from the
first pass, and new for each sector;
Fill each erased sector with 0xAA value. Finally, the target data area is to be verified.
Military and government standards always require 100 percent residual data verification. It
is necessary to make sure that the operation has been properly accomplished. Besides
corrupted sectors discovered during the operation are to be logged to keep the user
informed, since these sectors may contain classified information.
The list of supported military and government standards may vary for your product.
Anyway you’ve always got the possibility to create a customized algorithm, defining up to 4
wiping patterns, number of passes for each wiping pattern and for the group of patterns,
thus providing the maximum possible security level.
GPT versus MBR
GUID Partition Table (GPT) is the next generation of a hard disk partitioning scheme developed to lift restrictions of the
old MBR. Being a part of the Extensible Firmware Interface (EFI) standard proposed by Intel to replace the outdated PC
BIOS, it offers a number of crucial benefits:
Up to 128 primary partitions for the Windows implementation (only 4 in MBR);
The maximum allowed partition size is 18 exabytes (only 2 terabytes in MBR);
More reliable thanks to replication and cyclic redundancy check (CRC) protection of the partition table;
A well defined and fully self-identifying partition format (data critical to the platform operation is located in
partitions, but not in un-partitioned or hidden sectors as this is the case with MBR)
64-bit Support
The bulk of software today is written for a 32-bit processor. It can meet the requirements of almost any end user.
However that is not the case when dealing with servers processing large amounts of data with complex calculations of
very large numbers. That is where 64-bit architecture comes into play.
It can boast improved scalability for business applications that enables to support more customer databases and more
simultaneous users on each server. Besides a 64-bit kernel can access more system resources, such as memory










