Kill Disk
Kill Disk
USER MANUAL
ver. 13
Updated: 11 Nov 2020
| Contents | ii
Contents
Legal Statement.............................................................................................. 4
Introduction.....................................................................................................4
Data Recovery......................................................................................................................................................................................4
Erasing Confidential Data............................................................................................................................................................... 5
Wiping Confidential Data............................................................................................................................................................... 6
International Standards....................................................................................................................................................................6
Overview.........................................................................................................6
System Requirements....................................................................................................................................................................... 7
Software Licensing............................................................................................................................................................................. 8
Registering the Software (Online).......................................................................................................................................... 8
Registering the Software (Offline)........................................................................................................................................10
Deactivating a Registration.....................................................................................................................................................12
Software Updates.............................................................................................................................................................................12
Getting Started............................................................................................. 13
Installation and Distribution......................................................................................................................................................14
Active@ Boot Disk Creator..........................................................................................................................................................15
Navigating...........................................................................................................................................................................................17
Disk Explorer...................................................................................................................................................................................... 18
Usage Scenarios............................................................................................ 19
Disk Erase............................................................................................................................................................................................ 19
Selecting Disk Area to Erase.................................................................................................................................................. 23
Disk Wipe............................................................................................................................................................................................ 24
Resume Erase.....................................................................................................................................................................................27
Secure Erase....................................................................................................................................................................................... 28
Processing Summary...................................................................................................................................................................... 32
Certificates, Labels and Reports................................................................................................................................................ 35
Erase Certificates......................................................................................................................................................................... 35
Disk Labels..................................................................................................................................................................................... 40
Reports (XML)............................................................................................................................................................................... 42
Command Line and Batch Modes............................................................................................................................................44
Command Line Mode............................................................................................................................................................... 44
Batch Mode................................................................................................................................................................................... 48
Advanced Tools............................................................................................. 48
File Browser........................................................................................................................................................................................ 48
Disk Viewer.........................................................................................................................................................................................50
Application Settings..................................................................................... 54
Preferences.................................................................................................... 58
General Settings............................................................................................................................................................................... 59
Disk Erase............................................................................................................................................................................................ 63
Secure Erase....................................................................................................................................................................................... 65
Disk Wipe............................................................................................................................................................................................ 67
Erase Certificate................................................................................................................................................................................68
Company Information.................................................................................................................................................................... 72
Technician Information.................................................................................................................................................................. 72
Processing Report............................................................................................................................................................................73
Disk Label Presets............................................................................................................................................................................76
Disk Viewer.........................................................................................................................................................................................81
Error Handling...................................................................................................................................................................................82
E-mail Notifications.........................................................................................................................................................................83
Troubleshooting............................................................................................ 84
Common Troubleshooting Tips................................................................................................................................................. 84
Application Log.................................................................................................................................................................................85
Hardware Diagnostic File..............................................................................................................................................................87
Appendix........................................................................................................88
Glossary................................................................................................................................................................................................88
How Fast Erasing Occurs?............................................................................................................................................................96
Erase Disk Concepts.....................................................................................................................................................................100
Wipe Disk Concepts.....................................................................................................................................................................103
Erase Methods (Sanitation Standards)................................................................................................................................. 108
Using KillDisk in PXE environment.........................................................................................................................................110
Customizing Boot Disk................................................................................................................................................................117
Name Tags........................................................................................................................................................................................120
Disk Hidden Zones (HPA/DCO)............................................................................................................................................... 121
Legal Statement
Copyright © 2020, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may
be reproduced in any form or by any means or used to make any derivative work (such as translation,
transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC.
LSOFT TECHNOLOGIES INC reserves the right to revise this documentation and to make changes in content
from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of
such revision or change.
LSOFT TECHNOLOGIES INC provides this documentation without warranty of any kind, either implied
or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a
particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s)
described in this documentation at any time.
All technical data and computer software is commercial in nature and developed solely at private expense.
As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion
of any legend provided on any licensed program or documentation contained in, or delivered to you in
conjunction with, this User Guide.
Active@ KillDisk, the Active@ KillDisk logo, KillDisk, KillDisk for Industrial Systems, KillDisk Desktop
are trademarks of LSOFT TECHNOLOGIES INC.
LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC.
Other brand and product names may be registered trademarks or trademarks of their respective holders.
Introduction
As a relatively new technology an overwhelming majority of people, businesses and organizations do not
understand the importance of security in digital data storage. The average hard drive stores thousands of
files written on it and many of them contain sensitive information. Over the course of a hard drives lifetime
the likelihood for recoverable remnants of sensitive information left on a hard drive at its end of life is very
high. To see this just try out KillDisk's File Browser on page 48 on your system drive. You'll be surprised
to see what you find!
Note:
Additionally, try formatting a USB drive with files on it and browse it with KillDisk's File Browser on
page 48 as well. Data leakages are not limited to hard drives!
Related information
File Browser on page 48
Data Recovery
Advances in data recovery have been made such that data can be reclaimed in many cases from hard drives
that have been wiped and disassembled. Security agencies use advanced applications to find cybercrime
related evidence. Also there are established industrial spy agencies using sophisticated channel coding
techniques such as PRML (Partial Response Maximum Likelihood), a technique used to reconstruct the data
on magnetic disks. Other methods include the use of magnetic force microscopy and recovery of data
based on patterns in erase bands.
Although there are very sophisticated data recovery systems available at a high price. Almost all the data
can also be easily restored with an off-the-shelf data recovery utility like Active@ File Recovery, making
your erased confidential data quite accessible.
Using KillDisk all data on your hard drive or removable device can be destroyed without the possibility
of future recovery. After using KillDisk the process of disposal, recycling, selling or donating your storage
device can be done with peace of mind.
Related information
Getting Started on page 13
Usage Scenarios on page 19
Erase Disk Concepts on page 100
The FORMAT utility actually creates new FAT and ROOT tables, leaving all previous data on the disk
untouched. Moreover, an image of the replaced FAT and ROOT tables is stored so that the UNFORMAT
command can be used to restore them.
FDISK merely cleans the Partition Table (located in the drive's first sector) and does not touch anything else.
Moreover, most of hard disks contain hidden zones (disk areas that cannot be accessed and addressed on a
logical access level). KillDisk is able to detect and reset these zones, cleaning up the information inside.
Related tasks
Disk Erase
Related information
Disk Erase on page 63
Erase Disk Concepts on page 100
Disk Hidden Zones (HPA/DCO) on page 121
Overview
KillDisk 13
KillDisk 13 is the most powerful consumer edition released to date. With the development and release
of KillDisk Industrial, KillDisk 13 gets benefits from industrial stability, improved disk handling, interface
layouts and advanced features including:
• Enhanced visualization of physical disks and erase processes
• Improved handling of disks with controller malfunctions
• Stable handling of hot-swappable and dynamic disks
• Sound notifications for completed erase jobs with different results
• Auto hibernate or shutdown the system after all jobs are completed
System Requirements
KillDisk runs on Linux and Windows operating systems with the following minimum requirements:
Workstation:
• PC: x64 (64-bit) or x86 (32-bit)
• CPU: Intel or AMD
• RAM: 512 Mb (Windows), 1 Gb (Linux)
• Disk: 100Mb of disk space
Video:
• VGA (800x600) or better resolution
Operating System:
• Windows XP to Windows 10, Server 2003 to 2016 (Windows version)
• Linux Kernel 2.x and higher (Linux version)
Drive Storage:
• CD/DVD/Blu-Ray optical drive (for applicable boot disk features)
• USB 1.0 / 2.0 / 3.0 storage device (for applicable boot disk features)
• Disk types supported:
• HDD via IDE, ATA, SATA I, SATA II, SATA III, SAS
• SSD via SATA I, SATA II, SATA III, SAS
• External eSATA & USB disks
• SCSI & iSCSI devices
• Onboard NVMe M.2 (SATA & PCI-E types)
• Removable media (USB drive, MemoryStick, SD card, Compact Flash, Floppy Disk, Zip Drive)
KillDisk supports all drives seen by the OS with read/write access, additional drivers can be loaded onto the
boot disk for drivers not included by default in the bootable environment.
Related information
Installation and Distribution on page 14
Software Licensing
KillDisk is licensed per concurrent use of the software and for each concurrent disk being erased or
wiped outlined in the EULA. The maximum number of disks erased in parallel corresponds to the number
of purchased licenses.
One Corporate license grants you an ability to run the software on one machine and erase one disk at any
given time. To run on several machines in an office or multiple drives in parallel on one machine you
require the corresponding number of licenses.
Site and Enterprise licenses grant the license holder unlimited use of the software in a geographical location
and worldwide respectively.
This licensing is maintained through software registration and activation. Once the full version of KillDisk is
purchased the license holder will receive an email with their Registered Name and Registration Key . Every
machine that needs to use the full version of the software needs to be activated with this key.
Activations are limited to the number of licenses held. To transfer from one machine to another they must
be deactivated from decommissioned hardware first.
For boot disks to be created the Active@ Boot Disk Creator must be registered with an active registration
key.
1. Select Register or Upgrade Software in the initial Registration & Licensing dialog launched on
application start up or click Registration… from the Help menu to access it from the application.
6. You should receive a response that the software has been registered. The registration is now complete.
You may click Next and exit the registration window
Note: You can also load registration information from a text file (.INI or .TXT) where the first line is
the name and second line is the key.
5. Copy & Paste your 30-digit registration key into the Registration Key: field. The Activation Request and
Activation Response boxes will appear
Deactivating a Registration
To transfer licenses from one machine to another you need to free up (remove) your activation on the
licensed machine. You may do this by deactivating the registration from within the KillDisk application:
1. Click Help > Remove License in the file menu bar
2. Click Deactivate Registration in the pop-up licensing window
Software Updates
KillDisk has a built-in update client to ensure you always have an access to the latest version of the
application. To check for update, use the file menu bar to navigate to Help > Check for Updates
Getting Started
This section describes the key features of KillDisk and explains basic functionality.
Windows versions:
In order to install the application double click KILLDISK-<VERSION>-SETUP.EXE file and follow the
instructions in the installation wizard.
The installed package contains two main applications:
• Active@ KillDisk for Windows (KillDisk.exe) - Run this application from your Windows operating
system to inspect local disks and erase/wipe your data
• Active@ Boot Disk Creator (BootDiskCreator.exe) - Create a bootable WinPE-based CD/DVD/BD/
USB disk to boot from and run Active@ KillDisk for Windows. Using Active@ KillDisk this way
allows you to wipe out confidential data from the system volumes while gaining exclusive use to
partitions because the operating system runs outside the partition that you are securing
Linux versions:
In order to install KillDisk on Linux make sure you found the Linux installation file as mentioned in the note
above. Double click KillDisk_Linux_Installer.tar.gz in your Linux environment and unpack the archive to a
proper location. To start installation simply run the following command in the directory where the archive
was unpacked:
sudo ./KillDisk_Linux_Installer.run
4. Select the target platform for booting up. Depending on version purchased one or more target
platforms are available for selection (Windows-based, Linux-based or Console Boot Disk)
Note: A USB Drive or blank CD/DVD/BD must be inserted and explicitly chosen on the first step
before you can proceed further.
Note: If you’ve created an ISO Image file you can burn it to a disk later on by using any utility of
your choice.
Related information
Software Licensing on page 8
Common Troubleshooting Tips on page 84
Navigating
Once the KillDisk application is launched the main application's dashboard appears. From here you can use
any of KillDisk's tools on your system. This section describes the main components of the application. The
full functionality and features of these components are discussed in their corresponding sections later.
Where:
To browse through each of these Views click on the appropriate tab. You may also open a View from the
View menu.
To open any closed View just select it from the View menu.
The status bar at the bottom of the workspace shows the current status of the application or status of the
activity in progress.
Related information
Usage Scenarios on page 19
Property Views
Disk Explorer
The Disk Explorer is a default View for the KillDisk application. All the attached HDD/SSD/USB disks are
visualized can be selected and manipulated here. New procedures like erasure can be initiated from here as
well as displaying statuses and progress for actions performed with disks.
An additional toolbar helps to execute frequently performed tasks. It contains the following buttons with
drop-down menus:
View
The disk explorer supports a range of different Views to use when performing KillDisk actions, each
with their own customizable settings for different use cases.
Related information
Preferences on page 58
Usage Scenarios
KillDisk is a powerful tool to provide disk erasure solutions for personal and corporate use. This section
describes the key features of KillDisk and how to use this software's many features. The software is highly
customizable and this guide will help get you started with configuring KillDisk for your system and using it
to the full potential.
Disk Erase
KillDisk is an extremely powerful tool for disk erasure. Individual disks can be erased according to any
desired standard with just a few clicks. The process is described below.
1. Select disks for erasure
Use Disk Explorer on page 18 to select one or more physical disks or logical volumes. For multiple
selection use Ctrl+Left Mouse click
2. Open Disk Erase dialog using one of the following methods:
• Click Erase Disk command on the action toolbar
• Click Actions > Erase Disk command from main menu
• Click Erase Disk command from context menu
Use tabbed Views to adjust disk erasure options if necessary. Options available are:
• Disk Erase on page 63
• Erase Certificate on page 68
• Processing Report on page 73
• Error Handling on page 82
If single disk is selected by Erase Disk command a disk area to be erased can be specified:
You may also click on individual partitions and the selected partitions will be erased.
Click Start button to go to the final confirmation dialog:
Related information
Erase Methods (Sanitation Standards) on page 108
Processing Summary on page 32
Certificates, Labels and Reports on page 35
If you're interested in specific areas of the disk (specific partitions), you may use the Select exact disk area
option. This allows you to use sliders on the disk visualization in order to select a particular range of sectors.
You may also click on individual partitions and they will be selected for erasure.
Disk Wipe
When you select a physical device the Wipe command processes all logical drives consecutively erasing
data in unoccupied areas (free clusters and system areas) and leaving existing data intact. Unallocated
space (where no partition exists) has been erased as well.
Note:
If you want to erase ALL data (existing and deleted) from the hard drive device permanently, see
Disk Erase on page 19.
If KillDisk detects that a partition has been damaged or it is not safe to proceed KillDisk does not wipe
data in that area. The reason it does not proceed: partition might contain an important data.
There are some cases where partitions on a device cannot be wiped. Some examples: an unknown or
unsupported file system, a system volume or an application start up drive. In these cases the Wipe
command is disabled. If you select a device and the Wipe button is disabled select individual partitions
(drives) and wipe them separately.
1. Select a disk or volume to wipe out in Disk Explorer > Local Devices View
You may select multiple disks/volumes to be wiped out simultaneously
2. Execute Wipe Disk command from Actions menu (or use the context menu)
Related information
Disk Wipe on page 67
Processing Summary on page 32
Certificates, Labels and Reports on page 35
• Resume previous Erase from the point it stopped on a disk (time saving option)
After application start all detected disks being analyzed for previously interrupted erases, and if stopped/
interrupted erases detected on one or more disks, Resume Erase button become active. Disks with an erase
interrupted are marked with a red label Interrupted Erase
Note:
If disks with interrupted erase being detected after program start, pop up dialog appears
automatically suggesting you to Resume Erase. You can run Resume Erase from here, or select the
only disks you need later on.
To Resume Erase:
1. Select a Disk or group of disks to Resume Erase for
2. Click Resume Erase button on a toolbar
Resume Erase Disk dialog appears. In the list will be displayed all disks where Resume Erase option is
available. You can select more disks for resume erase (if any available) or deselect some selected disks
Secure Erase
Most of Solid State Drives (SSD) support Secure Erase and use it for the physical deletion of all memory
blocks on the media. KillDisk Industrial is able use SSD SATA Secure Erase feature and perform fast
unrecoverable erasure. By doing this, you can increase the performance of frequently used SSDs for future
use. All of the data will be lost. Before using this feature make sure user fully understands the concepts of
the feature.
Warning:
100% FATAL DAMAGE GUARANTEED TO MEDIA IF THE PROCESS INTERRUPTED (POWER
OUTAGE, UNAUTHORIZED SSD EXTRACTION, ETC.)
Make sure your hardware setup is safe from sudden lost of power.
Do not interrupt the process of Secure Erase in any manner.
Note:
If there is a need to erase ALL data (existing and deleted) from the hard drive device permanently
with sanitation standards (US DoD 5220.22-M, Canadian OPS-II, NSA 130-2 etc.), use Disk Erase on
page 19 feature.
Important:
Secure Erase function is not available in Windows package of KillDisk, including applications
running under Active@ Boot Disk (which is based on WinPE). For security reasons Microsoft
intentionally blocked IOCTL_ATA_PASS_THROUGH function in all the latest Windows editions
starting from Windows 8.
Select disks marked as in Disk Explorer > Local Devices View. You may select multiple disks to be
erased simultaneously
2. Execute Secure Erase command from Actions menu or use context menu:
Note:
In case of a frozen SSD drive has been selected for erasing the following message appears in
Disk Secure Erase tab:
4. Click Start to reach the final step before erasing disk data
Confirm Secure Erase action by typing a predefined keyphrase and the process starts
Note:
There is no progress indicator available for Secure Erase. The feature is implemented inside SSD
controller. There is only "elapsed" time available:
After Secure Erase process is completed the Processing Summary on page 32 dialog appears
Now you may Print , Browse or Open Secure Erase Certificate and Reports (XML) on page 42. If there
are any errors they will be reported on the interactive screen and in Erase History Disk Processing Results.
Related information
Secure Erase on page 65
Processing Summary on page 32
Certificates, Labels and Reports on page 35
Secure Erase (SSD) on page 94
Secure Erase Concepts on page 101
Secure Erase (ANSI ATA, SE) on page 109
Processing Summary
Once KillDisk finishes processing any task such as Disk Erase on page 19, Secure Erase on page 28
or Disk Wipe on page 24, a summary dialog appears. It contains all of the information regarding to
the operation(s). For example, it includes information like disks operated on, status of erasure, logs and all
associated certificates and reports.
Results Overview window contains the options for the successful erasure:
Title
All the devices processed are displayed with their success/failure status in a tree list
Status
An actual status (success/fail)
Label
Volume or partition description
Method
Erase/Wipe sanitizing method being used
Erase Passes
Number of overwriting passes performed
Started at
Time & date of operation's start
Duration
Duration of the operation
Processing Attributes window contains all the status and attributes of the operations (as more detailed
View):
Note:
The Wipe operation will produce a similar processing summary for the Disk Wipe
Disk Certificate
Specifies the path to the saved erasure PDF certificate. Allows user to examine the certificate by pressing
the Open button
Print Labels
Allows user to examine, customize, change options and print Disk Labels on page 40 by pressing the
Print Labels button
Disk Processing Report
Specifies the path to the saved Disk Processing Report. Allows user to examine the .xml disk processing
report by pressing the Browse (to navigate to the containing folder) or Open buttons
Related information
Certificates, Labels and Reports on page 35
Erase Certificates
KillDisk provides PDF-certificates upon the completion of disk Erase , Secure Erase or Wipe operations.
These certificates may be customized to include company-specific information and hardware/procedure
description. Configuring these custom settings is described in the Certificate Preferences section of this
guide.
Certificate Elements
Company Logo
Custom company's logo can be placed to the certificate instead of the default KillDisk's logo at the top
right corner
Company Information
Displays all company information provided in the preferences. The user in the sample above only
provided a business name. But other company information may also be included in the certificate
Technician Information
Displays the technician information provided in the preferences. This section is for the name of the
operator and any notes they may want to include in the certificate report
Erasure Results Information
Displays information pertaining to the erasure procedure conducted on the hard drive(s). Type of erasure
algorithm, custom settings, date and time started and duration of the erasure are all listed here
Disk Information
Uniquely identifies the disk that was operated on by the KillDisk application. Includes information like
Name, Serial Number, Size and Partitioning Scheme
System Information
Provides details on the system used to run KillDisk such as the OS and processor type
Note:
The system information here only applies to the system running KillDisk, not the system that was
erased by the application! Provided KillDisk remains on one workstation.
Hardware Information
Provides details on the hardware used to run KillDisk such as Manufacturer, logical processors etc.
Disk Labels
Along with the PDF certificate KillDisk allows you to print Disk Labels to place on erased disks with its Print
Label features. Disk Labels with process results and essential disk information could be issued for any disk
processing (such as Disk Erase, Secure Erase or Disk Wipe). These labels may be completely customizable
to print on any sized sheet with any dimension. Simply specify the parameters and KillDisk will prepare the
printable labels for you.
Related information
Erase Certificates on page 35
Disk Label Presets on page 76
Reports (XML)
KillDisk gives you the option to save XML reports for any major operation it performs on a disk (such as
Disk Erase, Secure Erase or Disk Wipe ) .
In order to get the reports generated, simply select and configure them in Processing Report Preferences.
These reports may include (selected by user) all the information regarding to the KillDisk procedures, such
as:
• OS version • Name
• Architecture • Disks
• Kernel • Time
• Processors Additional Attributes
• Manufacturer • Fingerprint Information
Erase Attributes • Initialization
• Erase verify Erase Result
• Passes • Bay
• Method • Time and Date Started
• Verification passes • Disk Information
Error Handling Attributes • Status
• Errors terminate • Result
• Skip interval • Time Elapsed
• Number of Retries • Errors
• Source Lock • Name of operation
• Ignore Write Error
• Ignore Read Error
• Ignore Lock Error
KILLDISK.EXE -?
./KillDisk -?
Note: Parameters -test and -help must be used alone. They cannot be used with other parameters.
In this example data on device 80h will be erased using the default method (US DoD 5220.22-M) without
confirmation and returning to the command prompt screen when complete.
Here is another Windows example:
In this example all data on the first detected disk (which has 'zero' number or 80h) will be erased using US
DoD 5220.22-M method without confirmation and showing a report at the end of the process.
Note: In Linux environment to detect and work with physical disks properly Active@ KillDisk must
be launched under Super User account. So, if you are not a Super User, you should type a prefix
sudo , or su (for different Linux versions) before each command.
After you have typed KillDisk and added command line parameters press Enter to complete the command
and start the process.
Information on how drives have been erased is displayed on the screen when the operation has completed
successfully. KillDisk execution behavior depends on either command line parameters (highest priority),
settings configured in interactive mode and stored in the KILLDISK.INI file (lower priority), or default values
(lowest priority).
Batch Mode
Note: This feature is intended for advanced users only
Batch mode allows KillDisk to be executed in fully automated mode without any user interaction. All events
and errors (if any) are placed to the log file. This allows system administrators and technicians to automate
erase/wipe tasks by creating scripts (*.CMD, *.BAT files) for different scenarios that can be executed later in
different environments.
To start KillDisk in batch mode just add the –bm (or -batchmode) command line parameter to the other
parameters and execute KillDisk either from the command prompt or by running a script.
Here is an example of Batch mode execution with the wipe command:
This command will wipe all deleted data and unused clusters on all attached physical disks without any
confirmations using most secure Peter Gutmann's method and returning to the command prompt when
complete.
If –ns (-nostop) command line parameter is specified no user interaction is possible after erase/wipe
action started. So user cannot cancel the command being executed.
After execution application returns exit codes to the OS environment: 0 (zero) if all disks being erased
successfully, 1 (one) if errors occurred or nothing erased/wiped, and 2 (two) if minor warnings
occurred.
Related information
Command Line Mode on page 44
Advanced Tools
KillDisk offers a number of advanced tools to work in conjunction with the software to make operations
easier to perform and the disks easier to navigate. KillDisk makes it possible to browse through disks on
both: a file level and a low, hexadecimal (HEX) level. Disk health analysis with its S.M.A.R.T. monitor as well
as logs/reports export to the external databases fully supported in KillDisk Industrial version. This section
describes each of these features:
• File Browser
• Hexadecimal Viewer
File Browser
KillDisk includes a built-in File Browser for examining the contents of disks for verification purposes, for
hard drives' selection control or for erased files validation after erase . Details on using this feature are
discussed in this section.
The File Browser tab displays files and folders on the disk being selected.
Grey files indicate deleted files have not been sanitized. These files are recoverable. Running KillDisk's Wipe
operation ensures these files are unrecoverable and make these gray files disappear from the File Browser.
Note:
Found deleted files appear in their original directory (before they were deleted). The ! Lost &
Found ! folder is a virtual directory created for found deleted files with not discovered directory
information.
Disk Viewer
Disk Viewer allows users to view the contents of connected drives on a sector's level in a hexadecimal, ASCII
and Unicode representations. User is able to launch Disk Viewer from the main view as well as through the
main menu bar. Shortcut is Ctrl-H .
KillDisk also offers a list of templates to help display the organization of the sectors on the disk by colored
sections. Example above displays what happens when NTFS Volume is opened in the Disk Viewer. In this
case NTFS Boot Sector template has been attached automatically, and below is NTFS Boot Sector template
details in Templates View.
The Disk Viewer also includes a Find feature for locating specific data in the low-level disk View
Find what
Input the characters you are searching for in ANSI, Hex or Unicode
Search Direction
If you have an idea of where the data may be located specify where to search
Not
Search for characters that do not correspond to the Find what parameter
Ignore case
Disables case-sensitivity in the search
Use
Select between Regular Expressions and Wildcards
Go to Sector
Jumps to the particular sector or cluster on the disk
Partition Table
Jumps to the sector where partition table is located
Particular Partition
Lists all partitions and allows to jump to the boot sectors, to the beginning and to the end of any
available partition
Application Settings
When you start KillDisk change its settings (erase method, certificate options, etc…) and close the
application. All the current settings are saved to the KILLDISK.INI file in the location of the KillDisk
executable. These settings will be used as default values the next time KillDisk is run.
KILLDISK.INI is a standard text file with the list of possessing sections, parameter names and values. All
KillDisk settings are stored in the [General] section.
For parameter storage the syntax being used is:
Parameter=value
Here is an example of an INI file:
[General]
excludeSystemDisk=false
initHD=true
initRD=true
initCD=false
initFD=false
defaultSerialDetectionMethod=2
clearLog=false
logPath=C:\\Program Files\\LSoft Technologies\\Active@ KillDisk Ultimate 11\\
logName=killdisk.log
logging=0
shutDown=false
saveToRemovable=false
showCert=true
killMethod=0
killVerification=false
killVerificationPercent=10
initDevice=true
fingerPrint=false
autoEject=false
skipConfirmation=false
wipeMethod=0
wipeVerification=false
wipeVerificationPercent=10
wipeUnusedCluster=true
wipeUnusedBlocks=false
wipeFileSlackSpace=false
wipeInHex=false
wipeUserPattern=Erased by Active@ KillDisk
wipeUserPasses=3
eraseInHex=false
killUserPattern=Erased by Active@ KillDisk
killUserPasses=3
accessDeniedCount=10
retryAtt=3
ignoreErrors=true
saveCert=true
certPath=C:\\Users\\Mikhail\\certificates\\
hideDefaultLogo=false
computerIDSource=0
showLogo=false
logoFile=
clientName=
companyName=
companyAddress=
companyPhone=
logComments=I hereby state that the data erasure has been carried out in
accordance with the instructions given by software provider.
technicianName=Technician
sendSMTP=false
attachCert=true
useDefaultAccount=true
fromSMTP=
toSMTP=
nameSMTP=
portSMTP=2525
authorizeSMTP=false
usernameSMTP= password
SMTP=
mapName=
mapPath=
mapUser=
mapPass=
When KillDisk is running in interactive mode all these parameters can be configured from settings dialog
accessed by clicking the Settings toolbar button. They also can be changed manually by editing the
KILLDISK.INI file in any text editor (such as Notepad etc.).
Here is an explanation of all settings:
When you start KillDisk with or without command line parameters its execution behavior depends on
either command line settings (highest priority), settings configured in interactive mode and stored in the
KILLDISK.INI file (lower priority), or default values (lowest priority).
Default value means that if the KILLDISK.INI file is absent or exists, but contains no required parameter, the
predefined (default) value is used.
The latest version of KillDisk still supports settings stored by previous versions in INI file. However, on first
run it exports all settings to SETTINGS.XML file and work with this file thereafter.
Related information
Preferences on page 58
Preferences
KillDisk Preferences window is the central location where KillDisk features can be configured. These
features are divided into several tabs.
To open Preferences dialog:
• From main menu choose Tools > Preferences... or
• Use F10 keyboard shortcut at any time
Preferences dialog could be open from other task dialogs to change related settings:
• General Settings on page 59
• Environment
• Sound Notifications
• Action Triggers
• Disk Erase
• Disk Wipe
• Erase Certificate
• Company Information
• Technical Information
• Processing Report
• Disk Label Presets
• Disk Label Templates
• Disk Viewer
• Error Handling
• E-Mail Notifications
• SMTP Server Setting
Preferences allow users to configure all the global settings for the application.
General Settings
The General Settings tab allows to configure general application settings as well as the visual
representation.
These are configurable options pertaining to the applications functionality.
Computer ID
Configure how the KillDisk workstation is identified in logs & reports. Values are: None , BIOS Serial
Number , Motherboard Serial Number
Environment
These are configurable options pertaining to the applications user interface and user experience.
Application style
Configures the color scheme used in the application. Values are: Blue , Olive , None (Use OS default)
and Silver
Sound Notifications
These are configurable options related to application sounds: you can use either predefined values or
assign your own sounds (User defined sound file)
Action Triggers
Configure actions performed while application is running
Export erase certificates and application log to all detected removable media
Upon erase completion all certificates and logs will be automatically exported to attached USB disks
(all detected media of removable type)
Disk Erase
The Disk Erase tab provides settings' configuration for the KillDisk erase procedures.
Erase method
Choose one of more than 20 sanitizing methods including many international standards and custom
patterns
Erase verification
Percentage of disk to be verified after disk erasure
Note:
In some erase methods such as the US DoD 5220.22-M this option is mandatory. After the
erase operation has completed this feature will scan the entire drive evenly and verify the
integrity of the erase operation. This option is the percent of the sectors to check across the
disk. Most standards specify 10% as an accurate sample size for the verification.
This feature writes the specified fingerprint to the first sector of the erased drive. If erased disk
is plugged into the system and system boots from this disk the user will see this fingerprint as a
message on the screen
Erase confirmation
As a safety precaution to prevent accidental destruction of hard drives KillDisk uses the user-
typed keyphrase mechanism just before the erase procedure is initiated (see below). By default this
precaution mechanism is initialized with the key phrase ERASE-ALL-DATA . The key phrase can be
modified, configured as a randomly generated set of characters or disabled. The keyphrase should
be entered correctly in order to start the erase procedure
Related information
Erase Methods (Sanitation Standards) on page 108
Erase Disk Concepts on page 100
Disk Label Presets on page 76
Secure Erase
The Secure Erase tab provides settings' configuration for the Solid State Drive (SSD) specific erase
procedures.
Verify erasure
Percentage of disk to be verified after Secure Erase completes
Erase confirmation
As a safety precaution to prevent accidental destruction of hard drives KillDisk Industrial uses the
user-typed keyphrase mechanism just before the erase procedure is initiated (see below). By default
this precaution mechanism is initialized with the key phrase ERASE-ALL-DATA . The key phrase can be
modified, configured as a randomly generated set of characters or disabled. The keyphrase should
be entered correctly in order to start the erase procedure.
Related tasks
Secure Erase on page 28
Related information
Secure Erase (SSD) on page 94
Secure Erase Concepts on page 101
Secure Erase (ANSI ATA, SE) on page 109
Disk Wipe
The Disk Wipe tab provides settings' configuration for Wipe procedure (like the erase procedure) allows you
to specify the erase method to use as well as a few additional wipe-specific options.
Erase method
Choose one of more than 20 sanitizing methods including many international standards and custom
patterns
Verify erasure
Related information
Erase Methods (Sanitation Standards) on page 108
Wipe Disk Concepts on page 103
Disk Label Presets on page 76
Erase Certificate
By selecting Use Erase Certificate check box the user is able to add and customize the erasure certificates
with Company Information on page 72, Technician Information on page 72 and other certificate
options.
This option includes the Hardware ID of the machine being erased on the certificate. It may be taken
from the BIOS or the Motherboard (these values may differ from each other).
Print Options
Always print certificate after disk erase
Prints erase certificate after erase completion automatically
Default printer
Select a default printer for printing erase certificates
Barcode
By selecting Include Barcode check box user is able to add a barcode in desired format.
Barcode data
Is a string of available tags and attributes concatenated by ^ (CARET) delimiter. User is able to
compose a custom string with selected values from drop-down list or by simple typing
Preview
Shows the composed data representation. This data is encoded to the actual barcode
Barcode Format
There is a drop-down list of available barcode formats
Error correction level (0-8) (if available for the Barcode Format selected)
Affects a size of the barcode. Increasing the level value provides a better scanner readability
Note:
Barcodes and QR Codes embedded to Certificates are available in KillDisk Industrial only.
Certificate location
Use this option to save erase certificate as a file in PDF format to the selected location
Digital Signature can be displayed as an overlay text on the first page of certificate. After you turn on
this option, you can specify overlay text using tags (see tags section), its position on the first page,
rectangle dimensions and text size
Related information
Name Tags on page 120
Company Information
These settings allow user to configure Company Information for Erase Certificates, Processing Reports and
Disk Labels.
To specify a Company Logo image just use the Set and Remove buttons. It allows you to select a desired
image with local File Explorer. Most of the image formats are supported: JPEG, TIFF, BMP, PNG etc. The logo
will be previewed in the Company Logo space.
Tip:
It is recommended to use company logo with resolution suitable for printing (300dpi) with a side
not exceeding 300px.
Technician Information
These settings allow user to configure Technician Information for Erase Certificates, Processing Reports and
Disk Labels.
Processing Report
These settings allow you to configure the XML reports generated by KillDisk.
Report Location
Here you may specify the template for the XML reports. The main tags available are:
There are additional tags available (see the tags section in Appendix)
Optionally adds the company information (defined in Company Information) into the XML erasure
report
Optionally adds the technician information (defined in Technician Information) into the XML erasure
report
Ensures that the system-specific information is saved in the XML report, such as:
• Operating system
• Kernel version
• Architecture (x86, x64)
Ensures that the system-specific information is saved in the XML report, such as:
• Motherboard manufacturer
• Motherboard description
• Host (name, domain)
• CPU (logical, physical)
• Memory
Optionally adds an additional information about disk health based on S.M.A.R.T. attributes into the
XML erasure report.
Note:
If internal tag <task> is present, Results are appeared inside.
Related information
Name Tags on page 120
Label preset
Displays and let you select a default Label Preset or create a new one. Add New Label Preset button
allows you to create a custom label preset with your own specifications. Delete button deletes the
selected label preset
Label title
Allows you to set a title to be printed (in bold) at the top of the labels. It can be company name, batch
name or any other descriptors you may consider useful to identify the operation. Static text can be typed in
or any dynamic attributes (tags) can be inserted at current cursor's position. Click Insert Name Tag button
Label Area
Label's content for the preset. Static text can be typed in or any dynamic attributes (tags) can be inserted at
current cursor's position. Click Insert Name Tag button to insert predefined tag from the drop-down
list. Click Clear Pattern button to empty all label's area
Label Attributes
You can use RTF formatting and set Word Wrapping behavior using related check boxes
Add signature line
Toggling this "ON" places a line at the bottom of the label for the technician to sign off on upon
completion of the wipe
Label preview
Displays a preview of one label with the current input settings. Refreshes when any adjustments are made
to the settings.
Barcode options
Selecting Append barcode check-box will print QR Code or Barcode on the label to be able to be scanned
thereafter for third party inventory database
Barcode data
String including essential erase parameters to be encoded and transformed to QR Code or Barcode.
Static text can be typed in or any dynamic attributes (tags) can be inserted at current cursor's
position. Click Insert Name Tag button to insert predefined tag from the drop-down list
Preview
Displays a preview of encoded string with the current input settings. Refreshes when any
adjustments are made to the settings.
Format
List of supported QR Code and Barcode formats. Currently supported: Aztec 2D barcode , Code 39
1D , Code 93 1D , Code 128 1D , QR Code . Note that different types of Barcodes can accept different
size of encoded string
Encoding
If barcode string contains symbols other than English letters, you can specify encoding (code page)
for the particular language
Size, mm
Size in millimeters for the Barcode/QR Code to be printed on the label
Note:
Barcodes and QR Codes embedded to Disk Labels are available in KillDisk Industrial only.
Print options
Define options for label printing including special label printers (Brother QL-700 etc.):
Default printer
Define printer to be used exclusively to print labels from the list of installed printers
Print test label command will let you print Disk Label sample to verify your settings and selected layout
attributes.
The print label dialog gives you an access to a number of predefined standard templates and to any custom
templates you may create. These templates may be easily selected without opening any additional dialogs.
The details of the selected template are displayed below the selection box. If your specific labels differ
from any of the templates available the button allows you to create a custom template with your own
specifications. Additionally, the button allows you to modify an existing template and the button
deletes the selected template.
Upon clicking the button the following Template Editor window appears. Descriptions of the Template
Editor options are listed below.
Template Title
Here you may create a custom title for your template. This is the name to refer this template when
selecting it in the Print Label dialog
Page
Here you can specify the dimensions of the page used to print the labels. This may be selected from
the list of standard sizes or defined using exact measurements
Page margins
Page margins are defined for the top, bottom, left and right sides of the page
Label Layout
These settings define how the labels appear on the page. You may define the spacing in
between labels on the page and the dimensions of the label grid. Once you've enter the proper
measurements KillDisk will take care of the formatting
Size units
The units of measurement may vary between millimeters, inches, pixels and points. If a value in
entered in one measurement and the unit size is changed the appropriate conversion will take place
Disk Viewer
These settings allow user to set hexadecimal View settings, font and interaction.
Hexadecimal offsets
Toggles offset format between decimal and hexadecimal
Lines to scroll
Number of lines to scroll for a single mouse wheel sweep
Pages to scroll
Number of pages to skip for a single PageUp or PageDown click
Font name
Select any mono-space font available for better experience
Font size
Font size to be used in binary view
Error Handling
KillDisk has a wide capabilities to handle errors during continuous disk processing. Those are the advanced
settings to configure KillDisk's error handling.
E-mail Notifications
KillDisk can deliver results of its sanitation process by e-mail.
Certificate, XML Report or Application Log can be e-mailed to the client, just check the related option.
When you check Use E-Mail Notifications option the next set of options: SMTP Server Settings will be
available for configuration.
These options can be configured in the Freeware version but are available for use in the Professional version
only.
Account Type
KillDisk offers you a free SMTP account located on www.smtp-server.com that can be used for
sending reports out. By default all the required parameters are filled and configured properly. The
only field you need to type in is the e-mail address where reports will be sent to. If your corporate
policy does not allow using services other than its own you need to switch this option to Custom
Account and configure all the settings manually. Ask your system/network administrator to get these
parameters
To
Type an e-mail address where erasing/wiping reports will be sent to
From
Type an e-mail address which you expect these reports to come from
SMTP Server
KillDisk offers you the use of smtp-server.com for a free SMTP account. This account is pre-
configured for KillDisk users. Ask your system/network administrator to get the SMTP server name
to be used in the Custom Account
SMTP Port
For the free SMTP account KillDisk allows you to use smtp-server.com on port 80. This is a standard
port being used by all web browsers to access the Internet. This port most likely is open on a
corporate and home networks. Other ports can be filtered by and closed by a network firewall. Ask
your system/network administrator to set up a proper SMTP port for the related SMTP server
Troubleshooting
In the event that you experience any technical difficulties with KillDisk you may choose to either
troubleshoot the system yourself or, if you have an active support and updates (you receive 1 year free with
your purchase), contact our support team and attach your application log and hardware configuration file
(hardware diagnostic)
Make sure you are not booting a 64-bit boot disk on a 32-bit system. In these cases create a Console
boot disk
Application Log
Application Log View reflects every action taken by the application and displays messages, notifications and
other service information. Use the messages in this screen to observe and further analysis of the recovery
process.
To open and activate Application Log View do one of the following:
• From main menu choose Tools > Application Log or
• Use F8 keyboard shortcut at any time
It is best to save the log file to a physical disk (different from the disk that holds the deleted data). By doing
this you reduce the risk of writing over the data that you are trying to recover.
Save Log As
Opens a standard save as dialog. Save the actual application log file to the local disk (default
extension is .log)
Maximum details
Shows advanced entries related to the application behavior and data analysis
Text size
Expand All
Expands a tree log data if available
Collapse All
Collapses a tree log data if available
Clear
Clear log for current application sessions
It is possible to go through the options with the context menu (right mouse click).
Tip:
We recommend that you attach a copy of the log file to all requests made to our technical support
group. The entries in this file will help us to resolve certain issues.
Note:
To save time when contacting our technical support staff we highly recommend that you provide us
with a hardware diagnostic file.
Related information
Application Log on page 85
Appendix
Glossary
BIOS Settings
Basic Input Output Subsystem is the program a personal computer's microprocessor uses to get the
computer system started after you turn it on. It also manages data flow between the computer's operating
system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer. A typical
method to access the BIOS settings screen is to press Delete / F1 / F2 / F8 / F10 or Esc during the boot
sequence
BCD
Boot Configuration Data. Firmware-independent database for boot-time configuration data. It is used by
Microsoft's new Windows Boot Manager and replaces the boot.ini that was used by NTLDR
Boot Priority
BIOS settings allow you to run a boot sequence from a floppy drive, a hard drive, a CD/DVD-ROM drive or
a USB device. You may configure the order that your computer searches these physical devices for the boot
sequence. The first device in the order list has the first boot priority. For example, to boot from a CD/DVD-
ROM drive instead of a hard drive, place the CD/DVDROM drive ahead of the hard drive in priority
Boot Record
See MBR
Boot Sector
The boot sector continues the process of loading the operating system into computer memory. It can be
either the Glossary on page 88MBR or the Glossary on page 88partition boot sector (see partition
boot sector, below)
Compressed cluster
When you set a file or folder property to compress data, the file or folder uses less disk space. While
the size of the file is smaller, it must use a whole cluster in order to exist on the hard drive. As a result,
compressed clusters contain file slack space. This space may contain residual confidential data from the file
that previously occupied this space. KillDisk can wipe out the residual data without touching the existing
data
CSV-file
A comma-separated values (CSV) file is a delimited text file that uses a comma to separate values. Each line
of the file is a data record. Each record consists of one or more fields, separated by commas. The use of the
comma as a field separator is the source of the name for this file format. A CSV-file typically stores tabular
data (numbers and text) in plain text, in which case each line will have the same number of fields
Data Cluster
A cluster or allocation unit is a unit of disk space allocation for files and directories. To reduce the overhead
of managing on-disk data structures, the file system does not allocate individual disk sectors by default,
but contiguous groups of sectors, called clusters. A cluster is the smallest logical amount of disk space that
can be allocated to hold a file. Storing small files on a file system with large clusters will therefore waste
disk space; such wasted disk space is called slack space. For cluster sizes which are small versus the average
file size, the wasted space per file will be statistically about half of the cluster size; for large cluster sizes,
the wasted space will become greater. However, a larger cluster size reduces bookkeeping overhead and
fragmentation, which may improve reading and writing speed overall. Typical cluster sizes range from 1
sector (512 B) to 128 sectors (64 Kb). The operating system keeps track of clusters in the hard disk's root
records or MFT records (See Lost Cluster)
Device Node
In the Local System Devices list, a physical device containing logical drives. The first physical device is
named 80h
Exclusive Access
Lock that is applied to a partition for exclusive writing access. For example, while recovering deleted or
damaged files or folders. The recovery operation must have exclusive access to the target partition while
recovering files. If another application or the operating system are using the target partition, user/process
must close all applications or system processes that may be using the target partition before locking it
FAT
File Allocation Table. File (dump) that contains the records of every other file and directory in a FAT-
formatted hard disk drive. The operating system needs this information to access the files. There are FAT32,
FAT16 and FAT versions. FAT file systems are still commonly found on floppy disks, flash and other solid-
state memory cards and modules (including USB flash drives), as well as many portable and embedded
devices. FAT is the standard file system for digital cameras per the DCF specification
FTP
File Transfer Protocol. This is a standard network protocol used for the transfer of computer files between a
Client and Server on a computer network. FTP is built on a client-server model architecture using separate
control and data connections between the client and the server. FTP users may authenticate themselves
with a clear-text sign-in protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure transmission that protects the username
and password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File
Transfer Protocol (SFTP). The first FTP client applications were command-line programs developed before
operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux
operating systems. Many FTP clients and automation utilities have since been developed for desktops,
servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such
as HTML editors
Free Cluster
A cluster that is not occupied by a file. This space may contain residual confidential data from the file that
previously occupied this space. KillDisk can wipe out the residual data
FreeDOS
A free operating system for IBM PC compatible computers. It intends to provide a complete DOS-
compatible environment for running legacy software and supporting embedded systems. FreeDOS can
be booted from a floppy disk or USB flash drive. It is designed to run well under virtualization or x86
emulation. Unlike most versions of MS-DOS, FreeDOS is composed of free and open-source software,
licensed under the terms of the GNU General Public License
iSCSI
Internet Small Computer Systems Interface. iSCSI is a transport layer protocol that works on top of the
Transport Control Protocol (TCP). It enables block-level SCSI data transport between the iSCSI initiator and
the storage target over TCP/IP networks
ISO
An International Organization for Standardization ISO-9660 file system is a standard CD-ROM file system
that allows you to read the same CD-ROM whether you're on a PC, Mac, or other major computer platform.
Disk images of ISO-9660 file systems (ISO images) are a common way to electronically transfer the contents
of CD-ROMs. They often have the file name extension .ISO (though not necessarily), and are commonly
referred to as "ISOs"
Logical Drive
A partition is a logical drive because it does not affect the physical hard disk other than the defined space
that it occupies, yet it behaves like a separate disk drive
Lost Cluster
A cluster that has an assigned number in the file allocation table, even though it is not assigned to any file.
You can free up disk space by reassigning lost clusters. In DOS and Windows you can find lost clusters with
the ScanDisk utility
MBR
Master Boot Record. All disks start with a boot sector. When you start the computer, the code in the MBR
executes before the operating system is started. The location of the MBR is always track (cylinder) 0, side
(head) 0, and sector 1. The MBR contains a file system identifier
MFT records
Master File Table. A file that contains the records of every other file and directory in an NTFS-formatted
hard disk drive. The operating system needs this information to access the files
Named Streams
NTFS supports multiple data streams where the stream name identifies a new data attribute on the file. A
handle can be opened to each data stream. A data stream, then, is a unique set of file attributes. Streams
have separate opportunistic locks, file locks, and sizes, but common permissions
NTFS
NT file system, New Technology File System (developed by Microsoft) is the file system that the Windows
NT operating system uses for storing and retrieving files on a hard disk. NTFS is the Windows NT equivalent
of the Windows 95 file allocation table (FAT) and the OS/2 High Performance File System (HPFS)
NTLDR
Aka NT loader is the boot loader for all releases of Windows NT operating system up to and including
Windows XP and Windows Server 2003. NTLDR is typically run from the primary hard disk drive, but it can
also run from portable storage devices such as a CD-ROM, USB flash drive, or floppy disk
openSUSE
A Linux distribution. It is widely used throughout the world. The focus of its development is creating usable
open-source tools for software developers and system administrators, while providing a user-friendly
desktop and feature-rich server environment
Partition
A section of memory or hard disk isolated for a specific purpose. Each partition can behave like a separate
disk drive
Physical Device
A piece of hardware that is attached to your computer by screws or wires. A hard disk drive is a physical
device. It is also referred to as a physical drive
RAID
RAID ("Redundant Array of Inexpensive Disks" or "Redundant Array of Independent Disks") is a data
storage virtualization technology that combines multiple physical disk drive components into one or more
logical units for the purposes of data redundancy, performance improvement, or both. Data is distributed
across the drives in one of several ways, referred to as RAID levels, depending on the required level of
redundancy and performance. The different schemes, or data distribution layouts, are named by the
word "RAID" followed by a number, for example RAID 0 or RAID 1. Each scheme, or RAID level, provides a
different balance among the key goals: reliability, availability, performance, and capacity. RAID levels greater
than RAID 0 provide protection against unrecoverable sector read errors, as well as against failures of whole
physical drives.
RAID 0
RAID 0 consists of striping, but no mirroring or parity. Compared to a spanned volume, the capacity
of a RAID 0 volume is the same; it is the sum of the capacities of the drives in the set. But because
striping distributes the contents of each file among all drives in the set, the failure of any drive
causes the entire RAID 0 volume and all files to be lost. In comparison, a spanned volume preserves
the files on the unfailing drives. The benefit of RAID 0 is that the throughput of read and write
operations to any file is multiplied by the number of drives because, unlike spanned volumes, reads
and writes are done concurrently. The cost is increased vulnerability to drive failures—since any drive
in a RAID 0 setup failing causes the entire volume to be lost, the average failure rate of the volume
rises with the number of attached drives
RAID 1
RAID 1 consists of data mirroring, without parity or striping. Data is written identically to two or more
drives, thereby producing a "mirrored set" of drives. Thus, any read request can be serviced by any
drive in the set. If a request is broadcast to every drive in the set, it can be serviced by the drive that
accesses the data first (depending on its seek time and rotational latency), improving performance.
Sustained read throughput, if the controller or software is optimized for it, approaches the sum of
throughputs of every drive in the set, just as for RAID 0. Actual read throughput of most RAID 1
implementations is slower than the fastest drive. Write throughput is always slower because every
drive must be updated, and the slowest drive limits the write performance. The array continues to
operate as long as at least one drive is functioning
RAID 2
RAID 2 consists of bit-level striping with dedicated Hamming-code parity. All disk spindle rotation is
synchronized and data is striped such that each sequential bit is on a different drive. Hamming-code
parity is calculated across corresponding bits and stored on at least one parity drive. This level is of
historical significance only; although it was used on some early machines (for example, the Thinking
Machines CM-2), as of 2014 it is not used by any commercially available system
RAID 3
RAID 3 consists of byte-level striping with dedicated parity. All disk spindle rotation is synchronized
and data is striped such that each sequential byte is on a different drive. Parity is calculated across
corresponding bytes and stored on a dedicated parity drive. Although implementations exist, RAID 3
is not commonly used in practice
RAID 4
RAID 4 consists of block-level striping with dedicated parity. This level was previously used by
NetApp, but has now been largely replaced by a proprietary implementation of RAID 4 with two
parity disks, called RAID-DP. The main advantage of RAID 4 over RAID 2 and 3 is I/O parallelism: in
RAID 2 and 3, a single read I/O operation requires reading the whole group of data drives, while in
RAID 4 one I/O read operation does not have to spread across all data drives. As a result, more I/O
operations can be executed in parallel, improving the performance of small transfers
RAID 5
RAID 5 consists of block-level striping with distributed parity. Unlike RAID 4, parity information is
distributed among the drives, requiring all drives but one to be present to operate. Upon failure of a
single drive, subsequent reads can be calculated from the distributed parity such that no data is lost.
RAID 5 requires at least three disks. Like all single-parity concepts, large RAID 5 implementations are
susceptible to system failures because of trends regarding array rebuild time and the chance of drive
failure during rebuild. Rebuilding an array requires reading all data from all disks, opening a chance
for a second drive failure and the loss of the entire array
RAID 6
RAID 6 consists of block-level striping with double distributed parity. Double parity provides fault
tolerance up to two failed drives. This makes larger RAID groups more practical, especially for high-
availability systems, as large-capacity drives take longer to restore. RAID 6 requires a minimum of
four disks. As with RAID 5, a single drive failure results in reduced performance of the entire array
until the failed drive has been replaced. With a RAID 6 array, using drives from multiple sources and
manufacturers, it is possible to mitigate most of the problems associated with RAID 5. The larger
the drive capacities and the larger the array size, the more important it becomes to choose RAID 6
instead of RAID 5. RAID 10 (see Nested RAID levels) also minimizes these problems
PXE
Preboot EXecution Environment. In computing the Preboot Execution Environment specification describes a
standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-
enabled clients. On the client side it requires only a PXE-capable network interface controller, and uses a
small set of industry-standard network protocols such as DHCP and TFTP
RAS
Remote Access Service. Is any combination of hardware and software to enable the remote access tools or
information that typically reside on a network of IT devices.
A remote access service connects a client to a host computer, known as a remote access server. The most
common approach to this service is remote control of a computer by using another device which needs
internet or any other network connection.
Here are the connection steps:
1. User dials into a PC at the office.
2. Then the office PC logs into a file server where the needed information is stored.
3. The remote PC takes control of the office PC's monitor and keyboard, allowing the remote user to view
and manipulate information, execute commands, and exchange files.
Many computer manufacturers and large businesses' help desks use this service widely for technical
troubleshooting of their customers' problems. Therefore you can find various professional first-party, third-
party, open source, and freeware remote desktop applications. Which some of those are cross-platform
across various versions of Windows, MacOS, UNIX, and Linux. Remote desktop programs may include
LogMeIn or TeamViewer.
To use RAS from a remote node, a RAS client program is needed, or any PPP client software. Most remote
control programs work with RAS. PPP is a set of industry standard framing and authentication protocols
that enable remote access.
Microsoft Remote Access Server (RAS) is the predecessor to Microsoft Routing and Remote Access Server
(RRAS). RRAS is a Microsoft Windows Server feature that allows Microsoft Windows clients to remotely access
a Microsoft Windows network.
Registry Hive
Highest level of organization in the Windows registry. It is a logical group of keys, subkeys, and values in the
registry that has a set of supporting files loaded into memory when Windows is started or an user logs in
Root Records
File Allocation Table. A file that contains the records of every other file and directory in a FAT-formatted
hard disk drive. The operating system needs this information to access the files. There are FAT32, FAT16 and
FAT versions
SAM
Security Account Manager. Database file that stores users' passwords in a hashed format. Since a hash
function is one-way, this provides some measure of security for the storage of the passwords. It can be used
to authenticate local and remote users. Beginning with Windows 2000 SP4, Active Directory authenticates
remote users.
Sector
The smallest unit that can be accessed on a disk. Typically sector size is 512 or 4096 bytes
SCSI
Small Computer System Interface. A set of standards for physically connecting and transferring data
between computers and peripheral devices. The SCSI standards define commands, protocols, electrical,
optical and logical interfaces. SCSI is most commonly used for hard disk drives and tape drives, but it
can connect a wide range of other devices, including scanners and CD drives, although not all controllers
can handle all devices. The SCSI standard defines command sets for specific peripheral device types; the
presence of "unknown" as one of these types means that in theory it can be used as an interface to almost
any device, but the standard is highly pragmatic and addressed toward commercial requirements
Signature Files
File types are recognized by specific patterns that may serve as a reference for file recovery. When a file
header is damaged, the type of file may be determined by examining patterns in the damaged file and
comparing these patterns to known file type templates
Span Array
A series of dynamic drives linked together to make one contiguous spanned volume
S.M.A.R.T.
S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology; often written as SMART) is a monitoring
system included in computer hard disk drives (HDDs), solid-state drives (SSDs) and embedded
MultiMediaCards (eMMC) drives. Its primary function is to detect and report various indicators of drive
reliability with the intent of anticipating imminent hardware failures. When S.M.A.R.T. data indicates a
possible imminent drive failure, software running on the host system may notify the user so preventative
action can be taken to prevent data loss and the failing drive can be replaced and data integrity maintained
Templates (patterns)
File types are recognized by specific patterns that may serve as a reference for file recovery. When a file
header is damaged, the type of file may be determined by examining patterns in the damaged file and
comparing these patterns to known file type templates. This same pattern-matching process can be applied
to deleted or damaged partitions. Using FAT or NTFS templates, recovery software can assume that a
particular sector is a FAT or NTFS boot sector because parts of it match a known pattern
Track
Tracks are concentric circles around the disk and the sectors are segments within each circle
Unallocated Space
Space on a hard disk where no partition exists. A partition may have been deleted or damaged or a
partition may not have been created
UEFI
Unified Extensible Firmware Interface is a specification for a software program that connects a computer's
firmware to its operating system (OS). UEFI is expected to eventually replace BIOS. Like BIOS, UEFI is
installed at the time of manufacturing and is the first program that runs when a computer is turned on
Volume
A fixed amount of storage on a hard disk. A physical device may contain a number of volumes. It is also
possible for a single volume to span a number of physical devices
Windows PE
Windows PE (WinPE) for Windows 10 is a small operating system used as a recovery environment to
install, deploy, and repair Windows 10 for Desktop Editions, Windows Server, and other Windows operating
systems. After boot to Windows PE, user can:
• Set up a hard drive before installing Windows.
• Install Windows by using apps or scripts from a network or a local drive.
• Capture and apply Windows images.
• Modify the Windows operating system while it's not running.
• Set up automatic recovery tools.
• Recover data from unbootable devices.
• Add a custom shell or GUI to automate these kinds of tasks
2) 14 TB Western Digital (manufactured in 2019) SATA III (6 Gbps) 7200 rpm disk with One Pass Zeros and
US DoD 5220.22-M (3 passes + 10% verification) showing the average speed of 12 GB/min per pass
One avenue of attack is the recovery of data from residual data on a discarded hard drive. When deleting
confidential data from hard drives, removable disks or USB devices, it is important to extract all traces of the
data so that recovery is not possible.
Most official guidelines regarding the disposal of confidential magnetic data do not take into account the
depth of today's recording densities nor the methods used by the OS when removing data.
Removal of confidential personal information or company trade secrets in the past might have been
performed using the FORMAT command or the FDISK command. Using these procedures gives users a
sense of confidence that the data has been completely removed.
When using the FORMAT command Windows displays a message like this:
Important:
Formatting a disk removes all information from the disk.
The FORMAT utility actually creates new FAT and ROOT tables, leaving all previous data on the disk
untouched. Moreover, an image of the replaced FAT and ROOT tables is stored so that the UNFORMAT
command can be used to restore them.
FDISK merely cleans the Partition Table (located in the drive's first sector) and does not touch anything else.
Moreover, most of hard disks contain hidden zones (disk areas that cannot be accessed and addressed on a
logical access level). KillDisk is able to detect and reset these zones, cleaning up the information inside.
The essence of the problem that Secure Erase can solve: drive began to work slowly (writing and reading
data). There can be a lot of reasons, some of them are related to the hardware component and some to
the software component. SSDs are very different in service from classic HDDs, therefore, simply deleting
data or formatting the drive does not really mean resetting the cell - you need to clear it before recording,
which slows down the process of recording new data. In theory, there shouldn’t be such problems, because
TRIM exists - a command to clear the data marked for deletion in cells. This command only works with
2.5” and M.2 SATA drives. For drives connected to the PCIe bus (M.2 or PCIe on the motherboard) there is
an analogue - Deallocate. But it happens that these functions are disabled for some reason - an OS error,
a user error in setting up a disk through third-party software, or the use of non-standard OS assemblies
with unknown software components. So, the disk starts to work noticeably slower and it is quite noticeable
without any benchmark performance measurements.
SSDs use a number of mapping layers that hide the physical layout of the flash-based memory, as well as
help in managing how flash memory data integrity and lifetime are managed. Collectively, these layers are
referred to as the Flash Translation Layer (FTL).
SSDs are also over-provisioned: they contain a bit more flash memory than what they’re rated for. This extra
memory is used internally by the FTL as empty data blocks, used when data needs to be rewritten, and as
out-of-band sections for use in the logical to physical mapping.
The mapping layers, and how the flash controller manages memory allocation, pretty much ensure that
either erasing or performing a conventional hard drive type of secure erase won’t ensure all data is
overwritten, or even erased at all.
One example of how data gets left behind intact is due to how data is managed in an SSD. When you edit a
document and save the changes, the saved changes don’t overwrite the original data (an in-place update).
Instead, SSDs write the new content to an empty data block and then update the logical to physical map
to point to the new location. This leaves the space the original data occupied on the SSD marked as free,
but the actual data is left intact. In time, the data marked as free will be reclaimed by the SSD’s garbage
collection system, but until then, the data could be recovered.
A conventional Secure Erase, as used with hard drives, is unable to access all of the SSD’s memory location,
due to the FTL and how an SSD actually writes data, which could lead to intact data being left behind.
SSD manufacturers understand the need for an easy way to sanitize an SSD, and most have implemented
the ATA command, Secure Erase Unit (used with SATA-based SSDs), or the NVMe command, Format NVM
(used with PCIe-based SSDs) as a fast and effective method of securely erasing an SSD.
So, SSD drives have a non-trivial system of work, therefore, the scheme for the complete destruction of
data should also not be the easiest. But in reality, this is not so at all. Any SSD has a controller that is the
"brain" of the drive. He not only tells the system where to write data, but also encrypts the information
passing through it and stores the key with himself. If you remove (or rather replace) a given key, then all the
information will turn into a random set of 1 and 0 - it will be impossible to decrypt it in any way. Just one
simple action by the user can solve the problem of safe data erasure. This method is the fastest and most
effective.
Note:
To protect information that is critical, both for serious organizations that are concerned about
the safety of data and for public sector enterprises working with information classified as state
secrets, information systems should usually use certified sanitation algorithms (US DoD 5220.22-M,
Canadian OPS-II, NSA 130-2 etc.).
If you combine these two methods (replacing the key and resetting the cells), you get the perfect algorithm
for obtaining a completely sterile disk in the state of its maximum performance. This, firstly, solves the
problem that we raised at the very beginning, and, secondly, it can help us answer the question about the
degree of drive wear.
It is important to note that some drives with built-in encryption can receive only one algorithm upon
receipt of a safe erase command - it depends on the controller settings by the manufacturer. If you "reset"
your SSD and compare the actual performance with the declared one, you will get the answer to this
question. This procedure does not affect disk wear (which is very important). Note that these actions are
designed specifically for analyzing the state of the disk, but it will not be possible to achieve a long-term
increase in the read/write speed due to the peculiarities of the operation of SSD disks - the situation may
depend on both the drive model and the controller firmware. And it must be noted that not all drives
support encryption. In this case, the controller simply resets the cells.
Wipe Algorithms
The process of deleting files does not eliminate them from the hard drive. Unwanted information may still
be left available for recovery on the computer. A majority of software that advertises itself as performing
reliable deletions simply wipes out free clusters. Deleted information may be kept in additional areas of a
drive. KillDisk therefore offers different wipe algorithms to ensure secure deletion: overwriting with zeros,
overwriting with random values, overwriting with multiple passes using different patterns and much more.
KillDisk supports more than 20 international data sanitizing standards, including US DoD 5220.22M and the
most secure Gutmann's method overwriting with 35 passes.
Figure 62: This is how Directory Area looks before Wiping, red rectangles display deleted records
Figure 63: Directory Area after Wiping: all deleted records removed, root defragmented
In the event of the deletion of a file or folder, there is a possibility of recovering the metadata of the file,
(such as its name and attributes), as well as the actual data that the file consists of. KillDisk's Wipe method
clears out all of this free space in the system files.
US DoD 5220.22-M
The write head passes over each sector three times. The first time with zeros 0x00, second time with 0xFF
and the third time with random characters. There is one final pass to verify random characters by reading
Canadian OPS-II
The write head passes over each sector seven times (0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, random). There is
one final pass to verify random characters by reading
US Army AR380-19
The write head passes over each sector three times. The first time with 0xFF, second time with zeros 0x00
and the third time with random characters. There is one final pass to verify random characters by reading
NAVSO P-5329-26 RL
RL method - the write head passes over each sector three times (0x01, 0x27FFFFFF, Random). There is one
final pass to verify random characters by reading
NCSC-TG-025
The write head passes over each sector three times (0x00, 0xFF, Random). There is one final pass to verify
random characters by reading
NSA 130-2
The write head passes over each sector two times (Random, Random). There is one final pass to verify
random characters by reading
NIST 800-88
Supported three NIST 800-88 media sanitation standards:
• 1. The write head passes over each sector one time (0x00).
• 2. The write head passes over each sector one time (Random).
• 3. The write head passes over each sector three times (0x00, 0xFF, Random).
For details about this,the most secure data clearing standard, you can read the original article at the link
below: http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_with-errata.pdf
German VSITR
The write head passes over each sector seven times
Bruce Schneier
The write head passes over each sector seven times (0xFF, 0x00, Random, Random, Random, Random,
Random). There is one final pass to verify random characters by reading
Peter Gutmann
The write head passes over each sector 35 times. For details about this, the most secure data clearing
standard, you can read the original article at the following link: http://www.cs.auckland.ac.nz/%7Epgut001/
pubs/se%0Acure_del.html
Australian ISM-6.2.93
The write head passes over each sector once with random characters. There is one final pass to verify
random characters by reading
all memory cells making them empty. In fact, this method restores the SSD to the factory state, not only
deleting data but also returning the original performance. When implemented correctly, this standard
processes all memory, including service areas and protected sectors
User Defined
User indicates the number of times the write head passes over each sector. Each overwriting pass is
performed with a buffer containing random characters. Enables user to define any disk erase algorithm
How to place a registered Active@ KillDisk into a Windows PE image for use in a network PXE boot
environment
Note:
To modify Windows PE image (WIM) you need to have Windows ADK installed.
Start the Active@ Boot Disk Creator and make bootable media.
Let's assume that the Active@ Boot Disk media has an F: letter in our environment:
Using the Windows Search Bar, find and run Command Prompt as an Administrator:
Create an empty directory C:\MOUNT and mount BOOT.WIM file to it using the DISM tool:
Command: Dism /mount-image /imagefile:F:\sources\boot.wim /index:1 /mountdir:C:\mount
Replace BOOTDISK.KEY in C:\MOUNT directory with BOOTDISK.KEY located at the root of Active@ Boot
Disk media (F:\ BOOTDISK.KEY). This file contains user's registration information.
How to load Active@ KillDisk over the network via PXE environment on Windows Server platform
• Add roles Windows Deployment Services
• Configure the WDS server, but don’t add images in WDS Configuration Wizard
• Add Windows PE image with Active@ KillDisk software Boot.wim in Boot Images on WDS server
• In properties of WDS server in Boot tab add our image as default boot image for x64 architecture
• Configure the DHCP server for work with WDS server
For more detailed instructions, read Microsoft TechNet official documentation.
How to load Active@ KillDisk over the network via PXE environment on a Windows 10 computer
There are several steps required to do this: configuring the WinPE WIM, Boot Manager and PXE Server.
For the configuration steps, let's assume that inserted Active@ Boot Disk has a F: letter in our
configuration environment.
Step 1: Copy WinPE Source Files onto the PXE Server
• Map a network connection to the root TFTP directory on the PXE/TFTP server and create a \BOOT
folder there. We will assign this network drive the Y: letter
Note:
You can the ‘Easy access’ feature in the Windows Explorer to do this.
Make sure to enable read/write permissions in the sharing and folder options
• Copy the PXE boot files from the mounted \BOOT folder of the Active@ Boot Disk boot.wim to the
\BOOT folder on PXE/TFTP server. For example:
copy C:\mount\windows\boot\pxe\*.* y:\boot
Note:
To mount/dismount the boot.wim file, see section “How to place a registered Active@
KillDisk into a Windows PE image for use in a network PXE boot environment”
• After dismounting the boot.wim, copy the bootable Windows PE image (F:\ Sources\boot.wim) to
the \BOOT folder on PXE/TFTP server
• Copy the file boot.sdi (F:\Boot\boot.sdi) to the \BOOT folder on PXE/TFTP server
Step 2: Configure boot configuration
• On a Windows 10 computer or in a Windows PE environment, create a BCD store using the
BCDEdit tool
• In the BCD store, configure the RAMDISK, BOOTMGR and OSLoader settings for the Windows PE
image
• Copy the BCD file to the \BOOT folder on PXE/TFTP server
• Configure your PXE/TFTP server and DHCP server to point PXE clients to download PXEBoot.com or
PXEBoot.n12
These are a few of the files that were copied over to the server in Step 1
For more details, see “Creating a BCD file for PXE boot” below.
Step 3: Deployment process
Boot the client machine through PXE, connected to the network. After pressing initializing the PXE boot, the
system should handle the rest. Here’s what will happen:
• The client is directed (by using DHCP Options or the PXE Server response) to download
PXEBoot.com
• PXEBoot.com downloads Bootmgr.exe and the BCD store. The BCD store must reside in a \BOOT
directory in the TFTP root folder. Additionally, the BCD store must be called BCD
• Bootmgr.exe reads the BCD operating system entries and downloads boot.sdi and the Windows PE
image
• Bootmgr.exe begins booting Windows PE by running Winload.exe within the Windows PE image
For more detailed instructions, read the Microsoft TechNet official documentation.
• Configure your DHCP settings. You may copy the ones below, just make sure the address it binds to
is a static IP address from your router. Under IP Pool 1st addr, input the first available IP address in
your routers IP pool settings.
• Configure your TFTP settings. You may also copy the setting below. Again, make sure the IP address
is your router’s static IP and the TFTP server root directory is the one you configured in Step 1.
4. Configure BOOTMGR settings (remember to replace GUID1 in the third command with your GUID):
bcdedit /store c:\BCD /create {bootmgr} /d "boot manager"
bcdedit /store c:\BCD /set {bootmgr} timeout 30
bcdedit /store c:\BCD -displayorder {bb254249-93e9-11e7-84cb-6c71d9da760e} -addlast
Your PXE/TFTP server is now configured. You can view the BCD settings that have been configured using
the command:
bcdedit /store <BCD file location> /enum all
To customize Active@ KillDisk Boot Disk (WinPE image), for example to change a default Erase Method
and to add a Company Logo:
1. Create custom KILLDISK.INI file using documented parameters (Application Settings)
Here is an example of an INI file which uses US DoD 5220.22-M (ECE) erase method with 10%
verification, stores logs, reports and certificates to X:\\ location (X: virtual drive is the only known drive
with guaranteed letter when boot disks starts), specifies Company Name and Logo Image file:
[General]
killMethod=3
killVerification=true
killVerificationPercent=10
logName=X:\\killdisk.log
showCert=true
saveCert=true
certPath=X:\\
showLogo=true
logoFile=X:\\MyCompanyLogo.png
companyName=LSoft.NET
@ECHO OFF
3. Start Active@ Boot Disk Creator configure Boot Disk start up settings
Start Active@ Boot Disk Creator
Click Windows Start menu and launch Active@ Boot Disk Creator from KillDisk folder
Select a Target
Select a media for Boot Disk to be created on (CD/DVD/BD ROM, ISO image or USB drive) and click
Next
Click Create button to burn CD/DVD/BD, or store Boot Disk to ISO file, or write Boot Disk to USB
disk, depending on Target option selected on the first step
Related tasks
Active@ Boot Disk Creator on page 15
Related information
Application Settings on page 54
Command Line Mode on page 44
Name Tags
General
{Computer ID}
Workstation (computer) ID
{OS}
Operating System name
{AppName}
Application name
{AppVersion}
Application full version
{KernelVersion}
Kernel version
{UniqueID}
Generated unique 8 symbols ID
{Time(ss)}
Seconds with leading zero
Disk
Values for these name tags retrieved from context device:
{Serial ID}
Disk serial number, retrieved from OS or from S.M.A.R.T. attributes
{Platform ID}
Disk platform identification (may be vary due to OS format)
{Product ID}
Disk manufacturer Id
{Model}
Disk model name (if available)
{Size}
Disk size in gigabytes
{Sectors}
Disk size in sectors
Processing attributes
Disk processing attributes based on execution conditions:
{Method}
Erase method
{Passes}
Erases passes description
{Verified}
Verification attribute
{DateStarted}
Process start date
{TimeStarted}
Process start time
{TimeElapsed}
Process elapsed time
{Status}
Overall completion status for group processing or separate disk processing status.
{StatusCode}
Overall process result digital code
• HPA is also used by various theft recovery and monitoring service vendors. For example, the laptop
security firm Computrace use the HPA to load software that reports to their servers whenever the
machine is booted on a network. HPA is useful to them because even when a stolen laptop has its
hard drive formatted the HPA remains untouched
• HPA can also be used to store data that is deemed illegal and is thus of interest to government and
police
• Some vendor-specific external drive enclosures (Maxtor) are known to use HPA to limit the capacity
of unknown replacement hard drives installed into the enclosure. When this occurs, the drive may
appear to be limited in size (e.g. 128 GB), which can look like a BIOS or dynamic drive overlay
(DDO) problem. In this case, one must use software utilities (see below) that use READ NATIVE MAX
ADDRESS and SET MAX ADDRESS to change the drive's reported size back to its native size, and
avoid using the external enclosure again with the affected drive
• Some rootkits hide in the HPA to avoid being detected by anti-rootkit and antivirus software
• Some NSA exploits use the HPA for application persistence