

The algorithm carries out three overwriting cycles. The standards differ from one another in terms of the sequence in which they overwrite information. The algorithm is considered reliable but requires considerable time for execution. This enhanced method of data deletion is considered one of the most reliable.

The method differs from the German VSITR in terms of its overwriting sequence. The process consists of seven overwriting cycles. To shred files or folders: Open the Avast Antivirus user interface.
#FILE SHREDDER WINDOWS PC#
This algorithm corresponds to protection class 2 (out of 6), according to the Russian State Technical Commission classification. You can shred individual files or entire folders from your PC at one time. The algorithm carries out one overwriting cycle using pseudo-random numbers and protects the data from recovery by common tools. Quick deletion prevents data recovery using standard recovery tools. The main advantage of this algorithm is its performance. The deletion process consists of two cycles of data overwriting: writing zeros and pseudo-random numbers. Other deletion methods can harm the SSD or USB device. To delete data from SSD and USB devices, it is recommended to apply Quick delete or GOST R 50739-95, Russia.

You can delete the data that you can access under your personal account. Data can be deleted from a memory card if its mechanical protection from rewriting is disabled. Removable drives or other devices that are recognized as removable drives (such as floppy disks, memory cards, USB disks, or cell phones).Deletion is possible if you have the rights required for writing and deleting data. Kaspersky Security Cloud makes it possible to delete data without the possibility to recover it from the following data media:
#FILE SHREDDER WINDOWS SOFTWARE#
Kaspersky Security Cloud contains a permanent data deletion tool that makes data recovery using standard software tools impossible. Added security of personal data is ensured by protecting deleted information against unauthorized recovery by hackers.
