Description Secure File Deleter Screenshots Download Updates history Technical information 12 cryptography security algorithms About Version PRO
23 May 2021 improvements: Few great performance and security improvements
The list of cryptography algorithms

Secure File Deleter includes 12 security algorithms for file deletion (also known as encryption algorithms). As the most important part of the program, it embodies its purpose. Having so many options makes our software excellent to be used at home or in the office. Our software meets the highest security standards.

• The most famous american DOD_5220.22_M
• Method which was designed by Peter Gutman, a scientist.
• Algorithm GOST_R_50739_95 which is widely used in various security systems in Russia.
• Less famous, but also very secure RCMP_TSSIT_OPS_II, which is originally from security departments of Royal Canadian Police.
• Method which was designed by Bruce Schneier, a scientist from Germany.
• German VSITR which is used in security system in Germany and in EU.
• British standard HMG_Infosec_Standard_5.
• Instructions for USA army AR380_19.
• Instructions for USA air force 5020.
• Cryptographic pseudo-random number generator CPRNG.
• Our own algorithm: random characters are written on the random places of the file.
• Our own algorithm: random characters are written over all contents of the file.


Contact us
Refund Policy
Privacy policy
Our Programs

Clean Space
Hidden Disk
Secure File Deleter
Prevent Recovery
Auto Recycle Bin

2 August 2021
New billing company

29 May 2020
We wish you good health

CyRobo, Freelance Group, New York - London - Prague, International
All rights reserved. Clean Space is a registered trademark.