Learn about Gutmann data deletion method
The Gutmann method was developed by Peter Gutmann in 1996 and is one of several software-based data sanitization methods used in some file shredder and data destruction programs, overwriting existing information on the hard drive. or other storage device.
Unlike a simple file deletion, a hard drive using the Gutmann method prevents all file recovery methods based on software that finds information on the drive, and also has the ability to prevent most based recovery methods. on the hardware extract information.
How does the Gutmann method work?
The Gutmann method uses a random character, instead of the zero index used in other techniques, for the first 4 overwrites and the last 4 rewrites, but using a complex pattern of overwriting 5th override to 31st overwrite. This method overrides a total of 35 times.
Is Gutmann better than other methods of deleting data?
The normal delete operation in the average operating system is not enough to safely delete files, because it only marks the file space as empty so that other files can be replaced.
On the market today, there are several different data sanitization methods that you can use, such as DoD 5220,22-M, Secure Erase or Random Data, but each option is different from the others. Gutmann method. The Gutmann method differs from other methods in that it performs 35 data overwrites instead of just one or several times. So should the Gutmann method be used instead of other options?
The Gutmann method was designed in the late 1900s. The hard drives used at that time used a different encoding method than the ones we use today, so most of the writes The method Gutmann performs is completely useless against modern hard drives. If you don't know exactly how each hard drive stores data, the best way to delete it is to use random patterns.

Peter Gutmann himself said the following:
"If you're using a drive that uses X encryption, you only need to perform specific overwrites for X, not need to do all 35 overwrites. For any modern drive, the thing the best you can do is do a few random overwrites ".
Each hard drive only uses an encryption method to store data, so it should be clear that although the Gutmann method can be applied very well to many different types of hard drives, using no encryption methods. the same, but in a nutshell, all that really needs to be done is just writing random data. The Gutmann method can do this and so do other data sanitization methods.
The software uses the Gutmann method
DBAN, CBL Data Shredder and Disk Wipe support the Gutmann method to overwrite all files on the entire drive. Some of these programs run from disk, while others are used from within the operating system, so you should choose the appropriate type of program, if you need to delete the main hard drive (for example, drive C) or drive. mobile. These 3 options are free.
File shredder programs can use the Gutmann method to delete specific files instead of the entire storage device including Eraser, Securely File Shredder, Secure Eraser and WipeFile .
Most data destruction programs support a number of data sanitization methods other than the Gutmann method, which means you can also use the above programs for other deletion methods.
There are also a number of programs that can wipe hard drive space using Gutmann method. This means that areas of the hard drive without data can be used over 35 times to prevent file recovery programs from retrieving information. CCleaner is an example.
You should read it
- Learn about the Write Zero method
- What is the Random Data method?
- What is the Schneier (Data Sanitization) method?
- Learn about the NAVSO P-5239-26 method
- What is Data Sanitization? Are there any Data Sanitization methods?
- Anonymous method in C #
- What is the HMG IS5 method?
- Pomodoro 'tomato' method: Working focused, highly effective without fatigue
May be interested
- Learn about the CSEC ITSG-06 methodcsec itsg-06 is a software-based data sanitization method, used in some file shredder and data shredder programs, to overwrite existing information on hard drives or other storage devices.
- After the scandal revealed data of 50 million accounts, social network users called to delete Facebook accountsfacebook said that since confirming the deletion process, the system may take up to 90 days to remove all the users posted, such as photos, status updates or other data stored in the system. backup system. after the deletion is complete, no one will have access to this information.
- 4 tips or data protection on iPadthe following tips will help you set the security code for each application in the ipad, set up a more complex password, remotely lock the data as well as back up data in case you are reluctant to delete data in the ipad.
- What is the HMG IS5 method?hmg is5 (infosec standard 5) is a software-based data sanitization method, used in some file shredder and data shredder programs to overwrite existing information on a hard drive or other storage device.
- Method to enter data simultaneously into multiple sheetsthe following article details how to enter data simultaneously into multiple sheets. there are 2 ways to enter data simultaneously into multiple sheets. method 1: group the sheets into groups using the ctrl key. method 2: use vba to enter data.
- Learn Clickjacking 2.0 attack methodbritish security expert - paul stone demonstrated a completely new attack method of clickjacking attack ...
- Delete Document in MongoDBthe remove () method in mongodb is used to delete the document from collection. the remove () method takes two parameters. the first parameter of the deletion criteria determines the document to delete, and the second parameter is justone.
- Learn about the Adversary-in-the-Middle phishing attack methodphishing attacks are extremely common right now. this method of cybercriminals can be very effective in stealing data and does not require a large amount of work at the grassroots level.
- If you want to be a data scientist, learn these 3 languages right away!the demand for skilled developers of data science continues to increase. if you want to work in this area, these are the things you need to learn.
- 5 ways to 'remove' the hard drive thoroughlythrow away computer hard drives safely, security becomes a hot topic, especially the number of confidential data leaks increases.