With High Secure Shredder all traces of your documents and files are gone.

Data and identity theft is a serious and growing threat.

According to a survey by independent market research company StrategyOne, commissioned by Symantec, 65% of all people globally have been victims of computer crime, which caused considerable damage. McAffee estimates the damage worldwide to $ 1 trillion annually.

Basic "delete" operations only remove bits of information from files, so they just appear deleted. It is easy to retrieve those files with common file recovery tools.

And even simple overwritten data can be recovered using sophisticated tools, such as magnetic force microscopes. One standard way to recover data that has been overwritten is to capture and process the analog signal obtained from the hard drive's read/write head. This analog signal will be close to an ideal digital signal, but the differences will reveal important information.

Basis "delete" operation
( unsecure )
Simple overwriten
( unsecure )
Shredding
( secure )

 

Secure Deletion:

The only way to protect your company and yourself from data or identity theft is to shred sensitive documents at the source with a high security tool that is capable of rewriting the files with random series of binary data multiple times.

 

 

High Secure Shredder

One of the most secure file shredding application is High Secure Shredder. It supports the most secure document shredding standards world wide, including the United States Department of Defense 5220.22-M National Industrial Security Standard, the USAF Cryptologic Support Center purging Standard and the Gutmann method.

Reliable, convenient, safe, and easy-to-use, High Secure Shredder has set the world standard for high quality engineering. With High Secure Shredder all traces of your documents are gone.

Protect your company and yourself
from data and identity theft.

Did you know, how easy deleted files can be retrieved using commonly available file recovery tools?

Ordinary "delete" operations only remove bits of information from files, so they just appear deleted. Even simple overwritten data can be recovered using sophisticated tools. ( Why shred files? )

The only and surest way to protect your company and yourself from data or identity theft is to shred sensitive documents at the source with a high security tool.

One of the best security application is High Secure Shredder. It supports the most secure document shredding standards world wide, including

  • The United States Department of Defense 5220.22-M National Industrial Security Standard,
     
  • The USAF Cryptologic Support Center purging Standard and
     
  • The Gutmann method.

And a detailed report keep you informed about all shred activities at any time.

Reliable, convenient, safe, and easy-to-use, High Secure Shredder has set the world standard for high quality engineering. With High Secure Shredder all traces of your documents are gone.

 

 

High Secure Shredder key features:

Detailed status reporting about all shred activities.
Meets the high secure document shredding standards, including AFSSI-5020, DoD 5220.22-M, Zero Out, Quick and Gutmann.
Additional overwriting with ASCII data
Visual and audio feedback.
Drag & Drop support to easily shred mass of files.
Detailed reporting about all shred activities.

 

High Secure Shredder Status Report

With the High Secure Shredder Status Report you are always informed about all shred activities.

The report helps you to figure out what's going on while shredding files, it enables you to identify errors and suggest corrective actions.

 

High Secure Shredder system requirements

  • Mac OS X Version 10.6.6 (Snow Leopard) or later.
     
  • Intel Mac.

Gutmann method

35 pass overwrite data

Basic "delete" operations only remove bits of information from files, so they just appear deleted, and even overwritten data can be recovered using sophisticated tools, like magnetic force microscopes.

The only way to protect your company and yourself from data or identity theft is to shred sensitive documents and files with a high security tool that is capable of rewriting the files with random series of binary data multiple times.

The Gutmann method is an algorithm for securely erasing the contents of documents and files. It destroys the magnetic memory by writing a series of 35 patterns over the entire region to be erased. This method provides highly effective security against the recovery of data.

 

 

Overwrite patterns chart

Gutmann method
(
35 pass overwrite data )
Pass

 

Data written Encoding scheme targeted

 

Binary notation Hexadecimal notation
1 Random Random      
2 Random Random      
3 Random Random      
4 Random Random      
5 01010101 01010101 01010101 55 55 55 (1,7) RLL   MFM
6 10101010 10101010 10101010 AA AA AA (1,7) RLL   MFM
7 10010010 01001001 00100100 92 49 24   (2,7) RLL MFM
8 01001001 00100100 10010010 49 24 92   (2,7) RLL MFM
9 00100100 10010010 01001001 24 92 49   (2,7) RLL MFM
10 00000000 00000000 00000000 00 00 00 (1,7) RLL (2,7) RLL  
11 00010001 00010001 00010001 11 11 11 (1,7) RLL    
12 00100010 00100010 00100010 22 22 22 (1,7) RLL    
13 00110011 00110011 00110011 33 33 33 (1,7) RLL (2,7) RLL  
14 01000100 01000100 01000100 44 44 44 (1,7) RLL    
15 01010101 01010101 01010101 55 55 55 (1,7) RLL   MFM
16 01100110 01100110 01100110 66 66 66 (1,7) RLL (2,7) RLL  
17 01110111 01110111 01110111 77 77 77 (1,7) RLL    
18 10001000 10001000 10001000 88 88 88 (1,7) RLL    
19 10011001 10011001 10011001 99 99 99 (1,7) RLL (2,7) RLL  
20 10101010 10101010 10101010 AA AA AA (1,7) RLL   MFM
21 10111011 10111011 10111011 BB BB BB (1,7) RLL    
22 11001100 11001100 11001100 CC CC CC (1,7) RLL (2,7) RLL  
23 11011101 11011101 11011101 DD DD DD (1,7) RLL    
24 11101110 11101110 11101110 EE EE EE (1,7) RLL    
25 11111111 11111111 11111111 FF FF FF (1,7) RLL (2,7) RLL  
26 10010010 01001001 00100100 92 49 24   (2,7) RLL MFM
27 01001001 00100100 10010010 49 24 92   (2,7) RLL MFM
28 00100100 10010010 01001001 24 92 49   (2,7) RLL MFM
29 01101101 10110110 11011011 6D B6 DB   (2,7) RLL  
30 10110110 11011011 01101101 B6 DB 6D   (2,7) RLL  
31 11011011 01101101 10110110 DB 6D B6   (2,7) RLL  
32 Random Random      
33 Random Random      
34 Random Random      
35 Random Random      

RLL :  Run Length Limited
MFM : Modified Frequency Modulation

 

See also:

Peter Gutmann  http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

DoD 5220.22-M Standard

Seven pass overwrite data

Basic "delete" operations only remove bits of information from files, so they just appear deleted, and even overwritten data can be recovered using sophisticated tools, like magnetic force microscopes.

The only way to protect your company and yourself from data or identity theft is to shred sensitive documents and files with a high security tool that is capable of rewriting the files with random series of binary data multiple times.

The United States Department of Defense 5220.22-M National Industrial Security Standard writes series of seven patterns over the entire region to be erased. This provides a highly secure erasure of disk data.

 

 

Overwrite patterns chart

DoD 5220.22-M Standard
(
7 pass overwrite data )
Pass
Data written
Binary notation Hexadecimal notation
1 11110110 0xF6
2 00000000 0x00
3 11111111 0xFF
4 Random Random
5 00000000 0x00
6 11111111 0xFF
7 Random Random

{mospagebreak title=AFSSI-5020}

AFSSI-5020 Standard

Three pass overwrite data

Basic "delete" operations only remove bits of information from files, so they just appear deleted, and even overwritten data can be recovered using sophisticated tools, like magnetic force microscopes.

The only way to protect your company and yourself from data or identity theft is to shred sensitive documents and files with a high security tool that is capable of rewriting the files with random series of binary data multiple times.

AFSSI-5020 is the USAF Cryptologic Support Center purging standard from 1996. It writes series of three patterns over the entire region to be erased. This option provides very good data security by optimal performance.

 

 

Overwrite patterns chart

AFSSI-5020 Standard
(
3 pass overwrite data )
Pass
Data written
Binary notation Hexadecimal notation
1 00000000 0x00
2 11111111 0xFF
3 Random Random

AFSSI-5020 Standard

AFSSI-5020 Standard

Three pass overwrite data

Basic "delete" operations only remove bits of information from files, so they just appear deleted, and even overwritten data can be recovered using sophisticated tools, like magnetic force microscopes.

The only way to protect your company and yourself from data or identity theft is to shred sensitive documents and files with a high security tool that is capable of rewriting the files with random series of binary data multiple times.

AFSSI-5020 is the USAF Cryptologic Support Center purging standard from 1996. It writes series of three patterns over the entire region to be erased. This option provides very good data security by optimal performance.

 

 

Overwrite patterns chart

AFSSI-5020 Standard
(
3 pass overwrite data )
Pass
Data written
Binary notation Hexadecimal notation
1 00000000 0x00
2 11111111 0xFF
3 Random Random

Want to try before you buy?

Whether you are looking for software for a specific project, or just want to flex your creative muscles and try something new, our collection of jalada software has something for everyone. And the best part? You can download a fully functional trial version for FREE!

You can now download your trial software by clicking the button for your operating system below.

High Secure Shredder

Size
15 MB