The data on drives formatted with cyberCide are destroyed beyond recovery using advanced wiping techniques that can stop both software and hardware tools from recoving data.
Meets and exceeds the U.S. Department of Defense standards for the computer, regardless of the file system and the operating system that resides on each drive (works with FAT12, FAT16, NTFS, DOS, Windows 3.x, Windows 95, Windows 98, Windows NT, Windows 2000, Windows XP, Unix, etc.).
Powerful verification capabilities that give the user the utmost assurance that all data has been completely removed from the disk.
The ability of wiping data on several machines simultaneously by installing cyberCide on bootable floppy diskettes.
The ability to maintain detailed logs of all sanitizing operations which can be printed and saved for permanent records.
Overall progress, average speed and estimated time indicators are available.
Powerful command-line parameter options that allow advanced users to run the program from the command prompt with no user interface (if desired) and create different wiping scenarios.
Santizing BIOS Free feature that allows user to address the full hard disk capacity even if, on some old machines, BIOS does not support large hard drives.
The ability to develop and use your own data-destroying algorithms, that perfectly suits your security needs.
The ability to generate random data streams using ISAAC Pseudo-Random Number Generating algorithm.
Peter Gutmann algorithm
Bruce Schneier algorithm
U.S. Standard, DoD 5220.22-M
NAVSO P-5239-26 (MFM)
NAVSO P-5239-26 (RLL)
Single-pass quick sanitizing method, with zeros
Single-pass quick sanitizing method, with random characters
Minimum of 286 or greater processor
550kb free conventional memory
EGA/VGA or above graphics
1.44 Mb floppy diskette drive for boot disk
Windows 3.1 + DOS
Linux (any distribution)
FreeBSD SCO UNIX
You may now use command lines to automate tasks and functions
Automatically partition drives after overwriting data.
Wipe back to front
Allows you to abort the process with minimal harm to data at begining of process
Genterate random data streams for added security
Overcome BIOS limits
LBA addressing allows user to wipe entire drive even if limited by BIOS (ATA/IDE only)