User's Manual

TuneUp Utilities 201 4 © 20 13 C opyright A V G Tec hnologies C Z, s.r.o. A ll rights res erved. 68
Prior to deletion, the files are overwritten with special data patterns multiple times, destroying the original
contents so effectively that even expensive examinations of the magnetic structure of the disk in a special
laboratory would not allow the data to be recovered.
Secure deletion, Gutmann method
This method, named after its inventor Peter Gutmann, overwrites the files to be deleted 35 times with random
values in a special pattern and then deletes them. This method is considered the most secure way to delete
files with software, but also takes the longest time.