Learn about the method of clearing DoD 5220.22-M data
DoD 5220.22-M is a software-based data sanitization method, used in various file shredder and data shredder programs to overwrite existing information on hard drives or other storage devices.
Deleting a hard drive using the DoD 5220.22-M method will prevent all software-based file recovery methods from getting the information from the hard drive and also prevent most hardware-based recovery methods.
What is DoD 5220.22-M?
The DoD 5220.22-M method was originally defined by the National Industrial Security Program of the United States and is one of the most common methods used for data destruction software.
Most data destruction programs support a number of data sanitization methods in addition to DoD 5220.22-M, such as Secure Erase, Write Zero, Random Data and Schneier.

How to delete DoD 5220.22-M
The data sanitization method of DoD 5220.22-M is usually performed in the following way:
- 1st time : Override number 0 and verify the writing.
- 2nd : Override number 1 and verify the writing.
- 3rd : Overwrite a random character and verify the writing.
You may also come across different versions of DoD 5220.22-M including: DoD 5220.22-M (E), DoD 5220.22-M (ECE), etc. Each version may use a single lettering. override and different verification frequency.
Although less common, there is another version of DoD 5220.22-M that overrides 97 for the last time instead of a random character.
The software uses the DoD 5220.22-M erasing method
Some free programs use the standard DoD 5220.22-M to erase all information from the hard drive.
A popular tool is DBAN. Similar software includes CBL Data Shredder.
Examples of some free file shredder software that have the option to delete files based on DoD 5220.22-M include Eraser, Securely File Shredder and Freeraser.
Is DoD 5220.22-M better than other methods?
It doesn't matter which method you delete data from. Because most of us just wipe our hard drive before selling or installing a new operating system, there's nothing to worry about how many random characters are written to the drive.
However, when choosing the data sanitization method, you need to consider how long it will take to wipe the drive. If you have a really large hard drive, Write Zero will take less time to complete than the DoD 5220.22-M, (but the DoD 5220.22-M will be much faster than Gutmann, the method can be done more. 30 overrides).
Also, consider whether verification is done after overwriting. Because some software can implement the DoD 5220.22-M method in a way that verifies each write, the whole process will take longer than using another erase method without verification (like Secure Erase), or wait until the last turn is completed to verify that the data has been overwritten.
Another factor that can determine the method you use is the actual data used to overwrite the hard drive. Some delete methods, like Write Zero, only use zeros instead of random characters. The use of random characters will make the probability of data recoverable lower.
You should read it
- Learn about the Write Zero method
- Learn about the NAVSO P-5239-26 method
- 4 tips or data protection on iPad
- Top 5 best stubborn file deletion software
- Top 10 best data recovery software
- What is the Random Data method?
- After the scandal revealed data of 50 million accounts, social network users called to delete Facebook accounts
- What is Secure Erase?
May be interested
- Learn Clickjacking 2.0 attack methodbritish security expert - paul stone demonstrated a completely new attack method of clickjacking attack ...
- Using AI to search for unexploded bombs and mines in Cambodiapost-war consequences are always a complex and costly task for any country.
- Learn about the Adversary-in-the-Middle phishing attack methodphishing attacks are extremely common right now. this method of cybercriminals can be very effective in stealing data and does not require a large amount of work at the grassroots level.
- If you want to be a data scientist, learn these 3 languages right away!the demand for skilled developers of data science continues to increase. if you want to work in this area, these are the things you need to learn.
- How to clear cache and delete different Android application data?cache is a temporary storage of certain data files on a device. the purpose of cache is to speed up, make the device more 'smooth' and to reduce the amount of data being processed. when clearing cache data of a certain application, it means deleting temporary files in the cache.
- Instructions for clearing Microsoft Edge browser cacheone of the ways to fix the browser error is to clear the edge browser cache as well as other junk data that slows down the browser.
- Synthetic Backup - New method for effective data protectionlarge and small businesses have been seeing their data growth following exponential levels in the last few years. that's why data security is becoming a very complex issue and needs to meet many needs.
- What is Data Scientist? How to become Data Scientist?data scientist is the most sexy profession of the 21st century, according to harvard business review. with intensive skillset and spread across many fields, data scientist is also considered 'rare as unicorn'.
- Tips for recovering selected data for iPhonesurely many of us often recover lost data on the iphone / ipad with the previous itunes backup package. this method is effective but does not allow users to choose the data that they want to recover.
- Generic in C #generic in c # allows you to delay the specification (specification) of the data type of programming elements in a class or method, until it is actually used in the program. in other words, generic allows you to write a class or method that can work with any data type.