Disinfection of data involves permanent deletion of data from the devices where it is stored to ensure that it cannot be restored.
Digital data sanitation allows media to be cleaned so that there is no residual information on the devices. This would impede the possibility of data recovery, even if hardware and software tools are used to recover destroyed information.
File Destroyer Manager (FDM) uses both standard and hybrid (such as BS-1493 M) technology solutions for data sanitation. |
![]() |
This process ensures that the possibility of recovering the deleted data using specialized software or hardware means will be avoided.
This is a very reliable form of sanitation because it confirms that 100% of the data has been replaced, at the byte level. It is also possible to generate system reports that prove that the data have been successfully disinfected.
The advantage of this method compared to physical destruction is that it does not destroy the device and allows it to be sold or reused.
The downside of data deletion, however, is that it is a time-consuming process and difficult to do without restricting access to the device.
This property is useful in generating and verifying digital signatures, files, critical data, authentication, and in generating random numbers or bits.
Algorithms differ in the strength of the security they guarantee. Other significant differences are the size of the blocks and the resulting final result. The calculation of the hash function for each of the files to be destoed is an essential element of the information destryction process. This issue is discussed in detail in the technical documentation of the application. |
![]() |
KDF's can be used to stretch keys into longer keys or to obtain keys of a required format. The original use for a KDF is key derivation, the generation of keys from secret passwords or passphrases.
Variations on this theme include:
The secret key is generated based on a randomly selected KDF function and is destroyed after the process is completed.
Random encryption is a fast and effective way to hybrid sanitize storage devices. It is best suited for removable or mobile storage devices, or those that contain highly sensitive information.
File Destroyer Manager (FDM) uses specialized encryption technology that is independent of the hardware and operating system used.
All processes are fully automated and exclude human intervention, which practically reduces the probability of error to a minimum.
Files and Folders Destruction Manager
FDM II