OS4 DepotLogo by mason 
(anonymous IP:,2219) 

   Bug tracker
   Locale browser


   o Audio (343)
   o Datatype (51)
   o Demo (203)
   o Development (600)
   o Document (22)
   o Driver (97)
   o Emulation (148)
   o Game (1005)
   o Graphics (499)
   o Library (116)
   o Network (233)
   o Office (66)
   o Utility (927)
   o Video (69)

Total files: 4379

Full index file
Recent index file



Support the site

 Readme for:  Utility » Misc » rherase.lha


Description: Secure file eraser
Download: rherase.lha       (TIPS: Use the right click menu if your browser takes you back here all the time)
Size: 103kb
Version: 1.2
Date: 17 Mar 2012
Author: Rupert Hausberger , aos4 port by kas1e
Submitter: kas1e
Email: kas1e/yandex ru
Homepage: http://natmeg.mooo.com/
Requirements: mui, info.datatype
Category: utility/misc
License: Other
Distribute: yes
Min OS Version: 4.0
FileID: 6968
Comments: 0
Snapshots: 1
Videos: 0
Downloads: 298  (Current version)
298  (Accumulated)
Votes: 0 (0/0)  (30 days/7 days)

Show comments Show snapshots Show videos Show content Show crashlogs Replace file 
  The progam is used to remove serious files from harddisk...

  - Easy to handle
  - Fully asyncron, can be aborted at any time
  - Supports different erase-methods:
    - US standard, DoD 5220.22-M (E)
    - US standard, DoD 5220.22-M (ECE)
    - German standard, VSITR
    - Bruce Schneier
    - Rupert Hausberger 15
    - Rupert Hausberger 30
  - Error report system

  - AmigaOS 4.x, info.datatype
  - NList classes

  Installation is very simple.
  Just drag the rhErase-drawer where you like, it does not need assigns.

  After the start go to the 'Settings' tab and select your prefered

  - US standard, DoD 5220.22-M (E)
    Based on 'National Industrial Security Program Operating Manual' (NISPOM) of
    the NSA from January 1995, this delete algorithm uses three write runs:

    1. overwrite with fixed values
    2. overwrite with random values
    3. overwrites with the complement value of the first run

    This is the most common algorithm, which one finds in almost any erase-tool.
    In the regulations NTSC-TG-025 of the US-american ministry of defense
    it is pointed out that the deletion of information with the military
    classification is not permitted 'secret' or 'top Secret' to with this
    For the use at home however, it is surely sufficiently.

  - US standard, DoD 5220.22-M (ECE)
    This is a variant of the DoD 5220.22-M with seven runs, whereby the data are
    overwritten again first with the three runs of the DoD 5220.22-M (E)
    afterwards with a random value, afterwards with the three runs of the DoD
5220.22-M (E)

  - German standard, VSITR
    With the VSITR standard, given change of the Federal Office for security in
    information technology (BSI), the data which can be deleted are overwritten
    altogether seven runs in the first six runs alternating with the values 0x00
    0xFF and in the last run with the value 0xAA.

  - Bruce Schneier
    The delete algorithm of Bruce Schneier, which he presented in it's book
    'Applied Cryptography', overwrites all data with the value 0xFF in the first
    in the second 0x00 and in five runs with cryptographic 'safe' random values
    following on it.

  - Rupert Hausberger 15
    This is a algorithm from the author of this tool. In the first step 0xff is
    then a random value and then 0x00. This is cyced 5 times, so thats 15 runs.

  - Rupert Hausberger 30
    This is a algorithm from the author of this tool. In the first step 0xff is
    then a random value and then 0x00. This is cyced 10 times, so thats 30 runs.

  Now select files and press the 'Erase' button...

  NOTE: If you select a directory, all dirs and subdirs will be erased too!

  ©2005-2012 Rupert Hausberger <natmeg()gmx.net>

NList            : ©2001-2012 NList Open Source Team

Mersenne Twister : ©1997 Makoto Matsumoto

  GPL. Please refer to the file COPYING for details.

  Please refer to the file ChangeLog for details.

Copyright © 2004-2024 by Björn Hagström All Rights Reserved