File Shredder

Available only in Kaspersky Plus and Kaspersky Premium.

Added security of personal data is ensured by protecting deleted information against unauthorized recovery by hackers.

The Kaspersky application contains a permanent data deletion tool that makes data recovery using standard software tools impossible.

The Kaspersky application makes it possible to delete data without the possibility to recover it from the following data media:

You can delete the data that you can access under your personal account. Before deleting data, make sure that it is not used by running applications.

To permanently delete data:

  1. Open the main application window.
  2. Go to the Privacy section.
  3. In the File Shredder section, click the Select files button.

    The File Shredder window opens.

  4. Click the Browse button, and in the Select files to delete window that opens select the folder or file to be deleted permanently.

    Deletion of system files and folders may cause operating system malfunctions.

  5. In the Data deletion method drop-down list, select the requisite data deletion algorithm.

    To delete data from SSD and USB devices, it is recommended to apply Quick delete (recommended) or GOST R 50739-95, Russia. Other deletion methods might damage an SSD or a USB device.

    • Quick delete (recommended). The deletion process consists of two cycles of data overwriting: writing zeros and pseudo-random numbers. The main advantage of this algorithm is its performance. Quick deletion prevents data recovery using standard recovery tools.
    • GOST R 50739-95, Russia. The algorithm carries out one overwriting cycle using pseudo-random numbers and protects the data from recovery by common tools. This algorithm corresponds to protection class 2 (out of 6), according to the Russian State Technical Commission classification.
    • Bruce Schneier Algorithm. The process consists of seven overwriting cycles. The method differs from the German VSITR in terms of its overwriting sequence. This enhanced method of data deletion is considered one of the most reliable.
    • VSITR standard, Germany. Seven overwriting cycles are performed. The algorithm is considered reliable but requires considerable time for execution.
    • NAVSO P-5239-26 (MFM) standard, USA, and NAVSO P-5239-26 (RLL) standard, USA. Three overwriting cycles are used. The standards differ from one another in terms of the sequence in which they overwrite information.
    • DoD 5250.22-M standard, USA. The algorithm carries out three overwriting cycles. This standard is used by the U.S. Department of Defense.
  6. Click the Remove button.
  7. In the deletion confirmation window that opens, click Remove.

Files that are being used by a third-party application cannot be deleted.

Page top