Description Secure File Deleter Screenshots Download Updates history How to use Technical information 12 cryptography security algorithms About Version PRO
18 November 2018 improvements: Fixed several minor bugs
The list of cryptography algorithms

Secure File Deleter includes 12 security algorithms for file deletion (also known as encryption algorithms). As the most important part of the program, it embodies its purpose. Having so many options makes our software excellent to be used at home or in the office. Our software meets the highest security standards.

• The most famous american DOD_5220.22_M
• Method which was designed by Peter Gutman, a scientist.
• Algorithm GOST_R_50739_95 which is widely used in various security systems in Russia.
• Less famous, but also very secure RCMP_TSSIT_OPS_II, which is originally from security departments of Royal Canadian Police.
• Method which was designed by Bruce Schneier, a scientist from Germany.
• German VSITR which is used in security system in Germany and in EU.
• British standard HMG_Infosec_Standard_5.
• Instructions for USA army AR380_19.
• Instructions for USA air force 5020.
• Cryptographic pseudo-random number generator CPRNG.
• Our own algorithm: random characters are written on the random places of the file.
• Our own algorithm: random characters are written over all contents of the file.

Support

Contact us
Contributors
Refund Policy
Privacy policy
Our Programs

Clean Space
Hidden Disk
Secure File Deleter
Prevent Recovery
Auto Recycle Bin
News

23 September 2018
1000 days online

28 July 2018
Completely redesigned version of Prevent Recovery!



©
CyRobo s.r.o., Zeletavska 1525/1, Prague, Czech Republic
All rights reserved. Clean Space is a registered trademark.