KillDisk Manual
KillDisk Manual
USER MANUAL
ver. 14
Updated: 29 Apr 2021
| Contents | ii
Contents
Introduction.....................................................................................................4
Sanitization Types...............................................................................................................................................................................4
Sanitization Standards...................................................................................................................................................................... 5
Erase Confidential Data................................................................................................................................................................... 6
Wipe Confidential Data................................................................................................................................................................... 7
Data Recovery......................................................................................................................................................................................7
Overview.........................................................................................................8
System Requirements....................................................................................................................................................................... 9
Software Licensing............................................................................................................................................................................. 9
Register Online.............................................................................................................................................................................10
Register Offline.............................................................................................................................................................................11
Deactivate License.......................................................................................................................................................................13
Software Updates.............................................................................................................................................................................15
Getting Started............................................................................................. 15
Installation.........................................................................................................................................................................................16
Navigation...........................................................................................................................................................................................17
Disk Explorer...................................................................................................................................................................................... 18
Create a Boot Disk.......................................................................................................................................................................... 19
Usage Scenarios............................................................................................ 21
Disk Erase............................................................................................................................................................................................ 21
Disk Area to Erase...................................................................................................................................................................... 25
Disk Wipe............................................................................................................................................................................................ 25
Resume Erase.....................................................................................................................................................................................28
Secure Erase....................................................................................................................................................................................... 30
Processing Summary...................................................................................................................................................................... 32
Certificates, Labels and Reports................................................................................................................................................ 35
Erase Certificates......................................................................................................................................................................... 35
Disk Labels..................................................................................................................................................................................... 40
XML Reports..................................................................................................................................................................................43
Helper Features.................................................................................................................................................................................45
Map Network Shares................................................................................................................................................................. 45
Set Disk Serial Number............................................................................................................................................................ 46
Reset Hidden Areas....................................................................................................................................................................47
Property Views............................................................................................................................................................................. 48
Command Line and Batch Mode..............................................................................................................................................51
Command Line Mode............................................................................................................................................................... 51
Batch Mode................................................................................................................................................................................... 54
Advanced Tools............................................................................................. 55
File Browser........................................................................................................................................................................................ 55
Disk Viewer.........................................................................................................................................................................................56
Settings File................................................................................................... 60
Preferences.................................................................................................... 64
General Settings............................................................................................................................................................................... 65
Disk Erase............................................................................................................................................................................................ 67
Secure Erase....................................................................................................................................................................................... 68
Disk Wipe............................................................................................................................................................................................ 69
Erase Certificate................................................................................................................................................................................70
Company Information.................................................................................................................................................................... 74
Technician Information.................................................................................................................................................................. 74
Processing Report............................................................................................................................................................................75
Disk Label Presets............................................................................................................................................................................78
Disk Viewer.........................................................................................................................................................................................83
Error Handling...................................................................................................................................................................................84
E-mail Notifications.........................................................................................................................................................................84
Troubleshooting............................................................................................ 86
Common Tips.................................................................................................................................................................................... 86
Application Log.................................................................................................................................................................................87
Hardware Diagnostic File..............................................................................................................................................................89
Appendix........................................................................................................90
How Fast Erasing Occurs?............................................................................................................................................................90
Erase Disk Concepts....................................................................................................................................................................... 94
Wipe Disk Concepts....................................................................................................................................................................... 98
Erase Methods................................................................................................................................................................................ 103
KillDisk and PXE............................................................................................................................................................................. 105
Customizing Boot Disk................................................................................................................................................................110
Name Tags........................................................................................................................................................................................113
Virtual Disks.....................................................................................................................................................................................115
Disk Hidden Zones....................................................................................................................................................................... 116
Glossary............................................................................................................................................................................................. 118
Legal Statement..........................................................................................126
Introduction
As a relatively new technology an overwhelming majority of people, businesses and organizations do not
understand the importance of security in digital data storage. The average hard drive stores thousands of
files written on it and many of them contain sensitive information. Over the course of a hard drives lifetime
the likelihood for recoverable remnants of sensitive information left on a hard drive at its end of life is very
high. To see this just try out KillDisk's File Browser on page 55 on your system drive. You'll be surprised
to see what you find!
The modern storage environment is rapidly evolving. Data may pass through multiple organizations,
systems, and storage media in its lifetime. The pervasive nature of data propagation is only increasing as
the Internet and data storage systems move towards a distributed cloud-based architecture. As a result,
more parties than ever are responsible for effectively sanitizing media and the potential is substantial
for sensitive data to be collected and retained on the media. This responsibility is not limited to those
organizations that are the originators or final resting places of sensitive data, but also intermediaries who
transiently store or process the information along the way. The efficient and effective management of
information from inception through disposition is the responsibility of all those who have handled the data.
The application of sophisticated access controls and encryption help reduce the likelihood that an
attacker can gain direct access to sensitive information. As a result, parties attempting to obtain sensitive
information may seek to focus their efforts on alternative access means such as retrieving residual data on
media that has left an organization without sufficient sanitization effort having been applied. Consequently,
the application of effective sanitization techniques and tracking of storage media are critical aspects of
ensuring that sensitive data is effectively protected by an organization against unauthorized disclosure.
Protection of information is paramount. That information may be on paper, optical, electronic or magnetic
media.
An organization may choose to dispose of media by charitable donation, internal or external transfer, or by
recycling it in accordance with applicable laws and regulations if the media is obsolete or no longer usable.
Even internal transfers require increased scrutiny, as legal and ethical obligations make it more important
than ever to protect data such as Personally Identifiable Information (PII). No matter what the final intended
destination of the media is, it is important that the organization ensure that no easily re-constructible
residual representation of the data is stored on the media after it has left the control of the organization or
is no longer going to be protected at the confidentiality categorization of the data stored on the media.
Sanitization refers to a process that renders access to target data on the media infeasible for a given level of
effort..
Note:
Additionally, try formatting a USB drive with files on it and browse it with KillDisk's File Browser on
page 55 as well. Data leakages are not limited to hard drives!
Sanitization Types
Sanitization Types
NIST 800-88 international security standard (Guidelines for Media Sanitization) defines different types of
sanitization.
Regarding sanitization, the principal concern is ensuring that data is not unintentionally released. Data is
stored on media, which is connected to a system. Simply data sanitization applied to a representation of the
data as stored on a specific media type.
When media is re-purposed or reaches end of life, the organization executes the system life cycle
sanitization decision for the information on the media. For example, a mass-produced commercial software
program contained on a DVD in an unopened package is unlikely to contain confidential data. Therefore,
the decision may be made to simply dispose of the media without applying any sanitization technique.
Alternatively, an organization is substantially more likely to decide that a hard drive from a system that
processed Personally Identifiable Information (PII) needs sanitization prior to Disposal.
Disposal without sanitization should be considered only if information disclosure would have no impact
on organizational mission, would not result in damage to organizational assets, and would not result in
financial loss or harm to any individuals. The security categorization of the information, along with internal
environmental factors, should drive the decisions on how to deal with the media. The key is to first think
in terms of information confidentiality, then apply considerations based on media type. In organizations,
information exists that is not associated with any categorized system. Sanitization is a process to render
access to target data (the data subject to the sanitization technique) on the media infeasible for a given
level of recovery effort. The level of effort applied when attempting to retrieve data may range widely. NIST
SP 800-88 Rev. 1 Guidelines for Media Sanitization Clear, Purge, and Destroy are actions that can be taken
to sanitize media. The categories of sanitization are defined as follows:
Clear
Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection
against simple non-invasive data recovery techniques; typically applied through the standard Read and
Write commands to the storage device, such as by rewriting with a new value or using a menu option to
reset the device to the factory state (where rewriting is not supported).
For HDD/SSD/SCSI/USB media this means overwrite media by using organizationally approved and
validated overwriting technologies/methods/tools. The Clear pattern should be at least a single write
pass with a fixed data value, such as all zeros. Multiple write passes or more complex values may
optionally be used.
KillDisk supports Clear sanitization type through the Disk Erase command for all R/W magnetic types of
media, more than 20 international sanitation methods including custom patterns implemented and can
be used.
Purge
Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the
art laboratory techniques.
For HDD/SSD/SCSI/USB media this means ATA SECURE ERASE UNIT, ATA CRYPTO SCRAMBLE EXT, ATA
EXT OVERWRITE, ATA/SCSI SANITIZE and other low-level direct controller commands.
KillDisk supports Purge sanitization type through the Secure Erase command only for media types
supporting ATA extensions.
Destroy
Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in
the subsequent inability to use the media for storage of data due to physical damages.
For HDD/SSD/SCSI media this means Shred, Disintegrate, Pulverize, or Incinerate by burning the device in
a licensed incinerator.
It is suggested that the user categorize the information, assess the nature of the medium on which it
is recorded, assess the risk to confidentiality, and determine the future plans for the media. Then, the
organization can choose the appropriate type(s) of sanitization. The selected type(s) should be assessed
as to cost, environmental impact, etc., and a decision should be made that best mitigates the risk to
confidentiality and best satisfies other constraints imposed on the process.
storage devices. It does not matter which operating systems or file systems are located on the machine
which disks being sanitized.
One avenue of attack is the recovery of data from residual data on a discarded hard drive. When deleting
confidential data from hard drives, removable disks or USB devices, it is important to extract all traces of the
data so that recovery is not possible.
Most official guidelines regarding the disposal of confidential magnetic data do not take into account the
depth of today's recording densities nor the methods used by the OS when removing data.
Removal of confidential personal information or company trade secrets in the past might have been
performed using the FORMAT command or the FDISK command. Using these procedures gives users a
sense of confidence that the data has been completely removed.
When using the FORMAT command Windows displays a message like this: Formatting a disk
removes all information from the disk.
Actually the FORMAT utility creates new empty directories at the root area, leaving all previous data on the
disk untouched. Moreover, an image of the replaced FAT tables is stored so that the UNFORMAT command
can be used to restore them.
FDISK merely cleans the Partition Table (located in the drive's first sector) and does not touch anything else.
Moreover, most of hard disks contain hidden zones (disk areas that cannot be accessed and addressed on a
logical access level). KillDisk is able to detect and reset these zones, cleaning up the information inside.
Related information
Disk Erase on page 67
Erase Disk Concepts on page 94
Disk Hidden Zones on page 116
Data Recovery
Advances in data recovery have been made such that data can be reclaimed in many cases from hard drives
that have been wiped and disassembled. Security agencies use advanced applications to find cybercrime
related evidence. Also there are established industrial spy agencies using sophisticated channel coding
techniques such as PRML (Partial Response Maximum Likelihood), a technique used to reconstruct the
data on magnetic disks. Other methods include the use of magnetic force microscopy and recovery of data
based on patterns in erase bands.
Although there are very sophisticated data recovery systems available at a high price. Almost all the data
can also be easily restored with an off-the-shelf data recovery utility like Active@ File Recovery, making
your erased confidential data quite accessible.
Using KillDisk all data on your hard drive or removable device can be destroyed without the possibility
of future recovery. After using KillDisk the process of disposal, recycling, selling or donating your storage
device can be done with peace of mind.
Related information
Getting Started on page 15
Usage Scenarios on page 21
Erase Disk Concepts on page 94
Overview
KillDisk 14
KillDisk 14 is the most powerful consumer edition released to date. With the development and release of
KillDisk Industrial, KillDisk gets benefits from industrial stability, improved disk handling, interface layouts
and advanced features including:
• Enhanced visualization of physical disks and erase processes
• Improved handling of disks with controller malfunctions
• Stable handling of hot-swappable and dynamic disks
• Sound notifications for completed erase jobs with different results
• Auto hibernate or shutdown the system after all jobs are completed
• Enhanced certificates and reports for disk erase and wipe
• Advanced Disk Viewer with flexible Search for low-level disk inspection
• Customizable file names for certificates & XML reports
• Unique Computer ID can be displayed in certificates/reports
• Disk health - SMART information can be displayed and monitored
• Customizable look & feel: four different application styles included
• ATA Secure Erase option for SSD (Linux and Console packages only)
New features for version 14 include:
• Added context help
• Dialogs adopted for low-resolution monitors (800x600)
• Secure e-mail notifications provided (added SSL & TLS support for SMTP)
• Improved Console functionality to support the latest hardware
• Latest kernel including bug fixes and improvements
New features for version 13 include:
• Resume Disk erase action to continue interrupted disk erase due to disk malfunction or errors
• Digitally signed PDF certificate with optional encryption and visual signature presentation
• Secure Erase (ATA command) implementation for Solid State Drives (SSD)
• Enhanced faulty disks detection and handling
• Bug fixes and major performance improvements
New features for version 12 include:
System Requirements
KillDisk runs on Linux and Windows operating systems with the following minimum requirements:
Workstation:
• PC: x64 (64-bit) or x86 (32-bit)
• CPU: Intel or AMD
• RAM: 512 Mb (Windows), 1 Gb (Linux)
• Disk: 100Mb of disk space
Video:
• VGA (1024x768) or better resolution
Operating System:
• Windows XP to Windows 10, Server 2003 to 2019 (Windows version)
• Linux Kernel 2.x and higher (Linux version)
Drive Storage:
• CD/DVD/Blu-Ray optical drive (for applicable boot disk features)
• USB 1.0 / 2.0 / 3.0 / 3.1 storage device (for applicable boot disk features)
• Disk types supported:
• HDD via IDE, ATA, SATA I, SATA II, SATA III, SAS
• SSD via SATA I, SATA II, SATA III, SAS
• External eSATA & USB disks
• SCSI & iSCSI devices
• Onboard NVMe M.2 (SATA & PCI-E types)
• Removable media (USB drive, MemoryStick, SD card, Compact Flash, Floppy Disk, Zip Drive)
KillDisk supports all drives visible by the OS with read/write access, additional drivers can be loaded onto
the boot disk for drivers not included by default in the bootable environment.
Related information
Installation on page 16
Software Licensing
KillDisk is licensed per concurrent use of the software and for each concurrent disk being erased or
wiped outlined in the EULA. The maximum number of disks erased in parallel corresponds to the number
of purchased licenses.
One corporate license grants you an ability to run the software on one machine and erase one disk at any
given time. To run on several machines in an office (or to erase multiple drives in parallel on one machine)
you require the corresponding number of licenses.
Site and Enterprise licenses grant the license holder use of the software in one geographical location and
worldwide respectively.
This licensing is maintained through software registration and activation. Once the commercial version of
KillDisk is purchased the license holder will receive an email with their Registered Name and Registration
Key . Every machine that needs to use the fully-functional version of the software needs to be activated with
this key.
Activations are limited to the number of licenses held. To transfer from one machine to another they must
be deactivated from decommissioned hardware first.
For boot disks containing KillDisk the Active@ Boot Disk Creator must be registered with a registration
key.
Register Online
For this task you require an active internet connection for the PC you wish to register the product on.
After installation Active@ KillDisk still starts as a FREE (unregistered) version having limited functionality.
You need to register it first to have all professional features activated. To register the software:
1. Start registration wizard
On application first start Registration & Licensing dialog launched by default. If freeware software has
already been registered, the dialog does not appear at start. In this case click Registration… menu item
from Help menu.
2. Select register option
Select the Register or Upgrade Software radio button. Read the License agreement and activate
the check box to agree to the Terms and Conditions of the license. Click Next to proceed with the
registration.
Register Offline
For this method of activation, you need another PC with a web browser and active Internet connection and
a USB flash disk for transferring activation data.
Note: Use this method only if the computer you are activating does not have Internet access.
In some cases such as security reasons or corporate firewalls you may not have access to an Internet
connection on the machine you wish to install the software on.
For product registration and activation offline:
1. Start registration wizard
On application first start Registration & Licensing dialog launched by default. If freeware software has
already been registered, the dialog does not appear at start. In this case click Registration… menu item
from Help menu.
Click Save... to store registration request to a file. Copy this file to a USB drive.
Deactivate License
To transfer licenses from one machine to another you need to free up (remove) your activation on the
licensed machine. You may do this by deactivating the registration from within the KillDisk application:
1. Start registration wizard
Click Registration… menu item from Help menu.
Click Next and Finish buttons to confirm and close registration wizard.
Your active license is now revoked from your PC and may be used to activate a different computer.
Note: Uninstalling the application from the computer using the uninstaller will also deactivate your
license.
Software Updates
KillDisk has a built-in update feature to ensure you always have an access to the latest version of the
application. To check for updates, use the file menu bar to navigate to Help > Check for Updates
Getting Started
This section describes key features of KillDisk and explains its basic functionality.
Related tasks
Disk Erase on page 21
Create a Boot Disk on page 19
Related information
Navigation on page 17
Certificates, Labels and Reports on page 35
Command Line and Batch Mode on page 51
Installation
After purchasing Active@ KillDisk a registration key will be emailed to you as well as a download link to
installation package named KILLDISK-<VERSION>-SETUP.EXE . This file contains everything you need to get
started - just double click the file and installation wizard will take you through the setup process. You need
to have Administrator's privileges to be able to install it properly.
Note: If you purchased the Ultimate version you receive installation executable file to
run on Windows. To access the Linux installation files install KillDisk on your Windows
machine and navigate to the application directory. In Linux sub-folder you will find
the Linux installation files. The path to the Linux application will look something like: C:
\Program Files\LSoft Technologies\Active@ KillDisk Ultimate 11\Linux
\KillDisk_Linux_Installer.tar.gz
After installation Active@ KillDisk still starts as a FREEWARE (unregistered) version having limited
functionality. You need to register it first to have all professional features activated.
Windows versions:
In order to install the application double click KILLDISK-<VERSION>-SETUP.EXE file and follow the
instructions in the installation wizard.
The installed package contains two main applications:
• Active@ KillDisk for Windows (KillDisk.exe) - Run this application from your Windows operating
system to inspect local disks and erase/wipe your data
• Active@ Boot Disk Creator (BootDiskCreator.exe) - Create a bootable Windows-based CD/
DVD/BD/USB disk to boot from and run KillDisk. Using KillDisk this way allows you to wipe out
confidential data from the system volumes while gaining exclusive use to partitions because the
operating system runs outside the partition that you are securing.
Linux versions:
In order to install KillDisk make sure you found the Linux installation file as mentioned in the note above.
Double click KillDisk_Linux_Installer.tar.gz in your Linux environment and unpack the archive to a proper
location.
To start installation simply run the following command in the directory where the archive was unpacked:
sudo ./KillDisk_Linux_Installer.run
Navigation
Once the KillDisk application is launched the main application's dashboard appears. From here you can use
any of KillDisk's tools. This section describes main components of the application and navigation. The full
functionality and features of these components are discussed in corresponding sections later.
Where:
To open any View being closed, just select it from the View menu.
The status bar at the bottom of the workspace shows the current status of the application or status of the
activity in progress.
Related information
Property Views on page 48
Disk Explorer
Disk Explorer is a default workspace for the KillDisk application. All attached HDD/SSD/USB disks are
visualized here and can be selected for different actions. Commands like Disk Erase can be initiated from
here as well as progress displayed for actions performed with disks.
Related information
Preferences on page 64
Note: If inserted USB Flash Drive doesn't appear in drop-down list, click USB not listed:
Initialize Disk link. You should be able to find removable disk in list of all attached devices and
initialize it to make compatible with the application. Initialization process shall erase all data on
the selected USB device.
4. Select target platform
Select the target platform for booting up: Windows-based Boot Disk , Linux-based LiveCD/LiveUSB or
Console-based Boot Disk (text mode application). Depending on version purchased one or more target
platforms are available for selection. Click Next to proceed to the next step.
5. Configure boot disk
Specify additional and customized boot disk options:
a) Configure System Boot Settings
To customize boot options click the System Boot Settings tab. You can change the default settings to
be used: Time Zone , Additional Language , Display Resolution , Default Application Start and Auto-
start Delay .
Network and Security sub-tabs allow to configure IP & Firewall settings as well as to protect Boot
Disk with a password.
b) Add your files
To add your custom files to the bootable media click User’s Files tab. Add files or folders with files
using the related buttons at the right side. Added items will be placed in the User_Files folder at the
root of bootable media.
c) Add extra drivers
To add specific drivers to be loaded automatically, click Add Drivers tab. Add all files for the
particular driver (*.INF, *.SYS, …). Added items will be placed in the BootDisk_Drivers folder at
the root of bootable media. At boot time all *.INF files located in this folder will be installed (if
compatible with a platform).
d) Add scripts
To add specific scripts to be launched after Boot Disk is loaded, click Add Scripts tab. Add your
scripts (*.CMD files). Added files will be placed in the BootDisk_Scripts folder at the root of bootable
media. At boot time all *.CMD files located in this folder will be executed (if properly created for the
particular platform).
e) Add command line parameters
To add command line parameters for KillDisk start up, click Application Startup tab and type all
parameters required (read documentation first). This tab is only enabled when KillDisk has been set
up as a Default Application at Boot Disk start up.
f) Configure KillDisk environment
To specify paths for KillDisk Certificate Logo file (LPG/PNG/BMP), Settings file (XML), Digital
Signature file (PFX) and Volume name to store Certificates/Logs/Reports, click App Config tab and
enter configuration information.
Click Next to proceed to the final step.
Usage Scenarios
KillDisk is a powerful tool to provide disk erasure solutions for personal and corporate use. This section
describes the key features of KillDisk and how to use this software's many features. The software is highly
customizable and this guide will help get you started with configuring KillDisk for your system and using it
to the full potential.
Usage scenarios include: Disk Erase, Disk Wipe, Secure Erase, Certificates, Labels, Reports, Command Line
Mode and Batch Mode operations.
Disk Erase
KillDisk is a powerful tool for disk sanitation. Individual disks can be erased with just few clicks using many
international sanitizing standards.
Disk Erase complete process is described below.
1. Select disks
Use mouse in Disk Explorer on page 18 to select one or more physical disks. Selected disks displayed
with orange borders.
For multiple selection use Ctrl+Left Mouse click.
To select all attached disks, press Ctrl+A .
To select a particular partition or volume, click the object in the Local Devices view.
2. Start erase
Open Disk Erase dialog using one of the following methods:
• Click Erase Disk command on the action toolbar
• Click Actions > Erase Disk command from main menu
• Click Erase Disk command from disk's context menu
Use tabbed views to adjust disk erasure options if necessary. Available options are:
• Disk Erase on page 67
• Erase Certificate on page 70
• Processing Report on page 75
If single disk is selected from Local Devices view, then exact area for the erase can be optionally
specified:
4. Click Start
Click Start button to go to the final Confirm Action dialog (depending on erase settings this dialog can
be skipped). This is an additional precaution measure. If you proceed with confirmation - all data on the
selected disk(s) or on selected disk area will be destroyed permanently - without any possibility to be
recovered.
Click OK button to confirm erase and start erase process.
5. Observe progress
After starting erase a progress bar is displayed at the disk area. The progress bar represents the
percentage of disk space being sanitized. As the procedure progresses the percentage increases and
time left recalculates.
To stop erase process, click Stop at any time (via action toolbar, main menu or context menu).
Related information
Erase Methods on page 103
Processing Summary on page 32
Certificates, Labels and Reports on page 35
Disk Wipe
When you select a physical device the Wipe command processes all logical drives consecutively erasing
data in unoccupied areas (free clusters and system areas) and leaving existing data intact. Unallocated
space, where no partitions exists has been erased as well.
Note:
If you want to erase ALL data (both existing and deleted files) from the device permanently, use
Disk Erase on page 21.
If KillDisk detects that a partition has been damaged, it does not wipe data in that area, because partition
might contain an important data. There are some cases where partitions on a device cannot be wiped.
Examples: an unknown or unsupported file system, a system volume or an application start up disk. In these
cases Wipe command is disabled. If you select a device and Wipe button is disabled, select individual
partitions (volumes) and wipe them separately.
Disk Wipe complete process is described below.
1. Select disks
Use mouse in Disk Explorer on page 18 to select one or more physical disks. Selected disks displayed
with orange borders.
For multiple selection use Ctrl+Left Mouse click.
To select all attached disks, press Ctrl+A .
To select a particular partition or volume, click the object in the Local Devices view.
2. Start wipe
Open Disk Wipe dialog using one of the following methods:
• Click Actions > Wipe Disk command from main menu
• Click Wipe Disk command from the context menu for disk or volume
If single disk is selected from Local Devices view, then exact area for the wipe can be optionally
specified:
Select all partitions
Select for wipe the only disk space where partitions located
4. Click Start
Click Start button to reach the final step before wiping out deleted data. Click Yes to confirm Wipe
action and process starts.
5. Monitor progress
The progress of the wiping procedure will be displayed on the disk or volume. To stop the process at any
time click the Stop button for the particular disk or volume. Click the Stop All button to cancel wipe for
all disks.
Related information
Disk Wipe on page 69
Processing Summary on page 32
Certificates, Labels and Reports on page 35
• Resume Erase from the point it stopped on a disk (time saving option)
When application starts all detected disks being analyzed for any erases interrupted previously, and if such
erases detected for one or more disks, Resume Erase button become active for these disks. Disks with
stopped or interrupted erase are marked with a red label Interrupted Erase .
Note:
If disks with interrupted erase being detected after program start, pop up dialog appears
automatically suggesting you to Resume Erase. You can run Resume Erase from here, or select the
particular disks later on.
Verify selected disks, certificate and report options and click Start button to resume interrupted erase.
Wait until erase is complete.
After erase completion there are options for reviewing results (logs, processing reports and attributes),
printing Erase Certificates and Disk Labels for processed disks.
Related tasks
Disk Erase on page 21
Related information
Processing Summary on page 32
Certificates, Labels and Reports on page 35
Secure Erase
Most of Solid State Drives (SSD) support Secure Erase for the low-level purging of all memory blocks on the
media. KillDisk is able use SATA Secure Erase feature and perform fast unrecoverable erasure. By doing
this, you can increase the performance of SSDs for future use. All of the data will be lost without recovery
options. Before using this feature make sure user fully understands the concepts.
Warning:
100% FATAL DAMAGE GUARANTEED TO MEDIA IF THE PROCESS INTERRUPTED (POWER
OUTAGE, UNAUTHORIZED SSD EXTRACTION, ETC.)
Make sure your hardware setup is safe from sudden lost of power.
Do not interrupt the process of Secure Erase in any manner.
Note:
If there is a need to erase ALL data (existing and deleted) from the hard drive device permanently
with sanitation standards (US DoD 5220.22-M, Canadian OPS-II, NSA 130-2 etc.) use Disk Erase on
page 21 feature.
Important:
Secure Erase is available for Linux-based packages only (Active@ KillDisk Linux package or
KillDisk on LiveCD in Active@ KillDisk Ultimate).
Secure Erase is not available in Windows-based packages, including applications running under
Active@ Boot Disk (which is based on WinPE). For security reasons Microsoft intentionally blocked
IOCTL_ATA_PASS_THROUGH function in all the latest Windows editions starting from Windows 8.
Select disks marked as in Local Devices view. You may select multiple disks to be erased
simultaneously.
2. Start secure erase
Open Secure Erase dialog using one of the following methods:
• Click Actions > Secure Erase command from main menu
• Click Secure Erase command from disk's context menu
3. Confirm secure erase options
Use tabbed views to adjust secure erase preferences if necessary.
Available preferences are:
• Secure Erase on page 68
• Erase Certificate on page 70
• Processing Report on page 75
• Error Handling on page 84
Important: Only disks which state is NOT frozen SSDs can be selected for Secure Erase
Warning:
In case if SSD which state is Frozen has been selected for Secure Erase the following message
appears:
You have options either to eject and insert back the SSD, or send PC to Sleep mode and resume
it back to get full access to the disk and proceed with a Secure Erase.
4. Click Start
Click Start button to reach the final step before erasing disk data completely without any possibility to
be recovered. Confirm Secure Erase action by typing a predefined keyphrase.
Click OK button to confirm erase and start erase process.
5. Observe progress
There is no progress indicator and Stop action available for the Secure Erase. The feature is implemented
inside SSD controller.
The only time elapsed is available and can be displayed.
After Secure Erase process is completed the Processing Summary on page 32 dialog appears :
Now you may Print and Open Erase Certificate and work with XML Reports on page 43.
If there are any errors they will be reported.
Related information
Secure Erase on page 68
Processing Summary on page 32
Certificates, Labels and Reports on page 35
Secure Erase (SSD) on page 124
Secure Erase Concepts on page 96
Secure Erase (ANSI ATA, SE) on page 105
Processing Summary
Once KillDisk finishes processing tasks such as Disk Erase on page 21, Secure Erase on page 30
or Disk Wipe on page 25, a Processing Summary dialog appears. It contains all of the information
regarding to the operation(s). For example, information which disks were erased, status of erasure, logs and
associated certificates and reports.
Results Overview
Tab contains the following information:
Title
All the devices processed are displayed with their erase status
Status
An actual erase status (success/fail)
Errors
Displayed number of errors detected (if any)
Label
Volume or partition description
Method
Erase/Wipe sanitizing method being used
Erase Passes
Number of overwriting passes performed
Started at
Time & date of operation's start
Duration
Duration of the operation
Processing Attributes
Tab contains detailed information about operation status and processing attributes:
Log
Tab shows actual processing log:
Note:
The Wipe operation will produce a similar processing summary for the Disk Wipe
Additional actions
Additional processing options and actions are:
Disk Certificate
Status of the saved PDF certificate. Allows user to print certificate ( Print button), browse certificate
directory with a file browser ( Browse button) or examine certificate ( Open button).
Print Labels
Examine, customize, change options and print Disk Labels on page 40 by clicking the Print Labels
button.
Disk Processing Report
Status of the saved Disk Processing Report. Examine the disk processing report .xml file (click Browse
button to navigate to the containing folder) or preview the report ( Open button).
Related information
Certificates, Labels and Reports on page 35
Erase Certificates
KillDisk provides PDF certificates upon the completion of Disk Erase, Secure Erase or Disk Wipe. These
certificates can be customized to include company-specific information and hardware/procedure
description. Configuring custom settings is described in the Certificate Preferences section of this guide.
Certificate Elements
Company logo
Company logo can be placed to the certificate instead of the default KillDisk's logo at the top right
corner.
Company information
Displays all company information provided in the preferences. The user in the sample above only
provided a business name. But other company information may also be included in the certificate.
Technician information
Displays the technician information provided in the preferences. This section is for the name of the
operator and any notes they may want to include in the certificate report.
Erasure results information
Displays information pertaining to the erasure procedure conducted on the hard drive(s). Type of erasure
algorithm, custom settings, date and time started and duration of the erasure are all listed here.
Disk information
Uniquely identifies the disk being erased. Includes information like Name, Serial Number, Size and
Partitioning Scheme.
System information
Provides details on the system used to run KillDisk such as Operating System and Architecture type.
Note:
The system information here only applies to the system running KillDisk, not the system that was
erased by the application!
Hardware information
Provides details on the hardware used to run KillDisk such as Manufacturer, Number of Processors, etc.
Note: Encrypting certificates with a password and digital signing options are not available when
running KillDisk under 32-bit Operating Systems. Only 64-bit platforms supported.
Related information
Disk Labels on page 40
XML Reports on page 43
Disk Labels
Along with the PDF certificate KillDisk allows you to print Disk Labels to attach to the disks being erased.
Disk Labels with erase status and essential disk information could be issued for any disk processing (such
as Disk Erase, Secure Erase or Disk Wipe). These labels may be completely customizable to print on label
tape or on sheet with any dimensions. Simply specify the parameters and KillDisk will prepare the printable
labels for you.
Related information
Erase Certificates on page 35
Disk Label Presets on page 78
XML Reports
KillDisk gives you the option to store XML reports for any major operation it performs (Disk Erase, Secure
Erase or Disk Wipe ) on a disk .
Configure Processing Report Preferences in order to get XML reports generated and saved to particular
location.
These reports may include detailed information regarding erase processes, such as:
• OS version • Name
• Architecture • Disks
• Kernel • Time
• Processors Additional Attributes
• Manufacturer • Fingerprint Information
Erase Attributes • Initialization
• Erase Verify Erase Result
• Passes • Bay
• Method • Time and Date Started
• Verification Passes • Disk Information
Error Handling Attributes • Status
• Errors Terminate • Result
• Skip Interval • Time Elapsed
• Number of Retries • Errors
• Source Lock • Name of Operation
• Ignore Write Error
• Ignore Read Error
• Ignore Lock Error
Helper Features
KillDisk has a number of extra features to ensure the most complete sanitation operations, flexibility to
meet the most strict requirements and compatibility with a wide range of systems. This section outlines
these features.
Related tasks
Map Network Shares on page 45
Related information
Set Disk Serial Number on page 46
Reset Hidden Areas on page 47
Property Views on page 48
Virtual Disks on page 115
2. Configure Mapping
Assign a drive letter, type a network folder location or click Browse button to browse local network and
select a proper network share. If sharing policy requires, type user name and password:
If you want to save configured mapping for future use, make sure Map automatically on program start
up is marked.
Note:
KillDisk will identify all connected network drives, so you may use the drop-down list to select
the one you'd like to use
There are several methods of disk serial number detection, application pulls it from various sources:
IOControl , SMART and WMI (some of them can be disabled and grayed out, depending on Operating
System support). Click the different options to apply different serial number detection method for the
particular disk. Default serial number detection method applied to all disks can be set up in Preferences.
Note:
If you don't see your serial number in any of the detection methods try marking the Swap Symbols
check box. If this doesn't help input the serial number manually (last option).
When related context menu item is disabled, this means that there are no hidden areas on the disk has
been detected, so nothing to reset.
Related information
Disk Hidden Zones on page 116
Property Views
To show detailed information about any subject of an application (such as disk, partition, volume, file etc.)
KillDisk uses information views. When displayed these views show information about the object being
selected in the Disk Explorer. If selected object is changed, displayed information refreshes.
Property View
To open Property View for selected item do one of the following:
• Click View > Windows > Properties from the main menu
• Press F4 (keyboard shortcut)
• Click Properties command from object's context menu.
Besides displaying a valuable data it also allows you to copy that information into a clipboard by using
context menu commands.
Context menu commands:
Copy Value
Copy Value of selected field to the clipboard (value only)
Copy Field
Copy formatted Name and Value pair to the clipboard
Copy All
S.M.A.R.T. Information
Another informational view displays S.M.A.R.T. (Self Monitoring, Analysis and Reporting Technology) data
for the selected disk (if the device supports it).
To show this view do one of the following:
• Click View > Windows > SMART Info from the main menu
• Use SMART Info context menu command for the selected disk
S.M.A.R.T. data can be used to detect problem disks as long as important disk information has been
reflected such as Power-on Hours, Reallocated Sectors and Current Pending Sectors.
Note:
When Current Pending Sectors parameter differs from zero, this means the disk has bad sectors. It
will cause problems in the future. Dispose these disks as soon as possible.
Related information
S.M.A.R.T Monitor
Preferences on page 64
KILLDISK.EXE -?
./KillDisk -?
Note: Parameters -test and -help must be used alone. They cannot be used with other parameters.
In this example data on device 80h will be erased using the default method (US DoD 5220.22-M) without
user confirmation and application quits (control returns to the command prompt) when complete.
Here is another Windows example:
In this example all data on the first detected disk (which has 'zero' number or 80h) will be erased using US
DoD 5220.22-M method without confirmation. After erase completes, processing summary report will be
displayed.
Note: In Linux environment to detect and work with physical disks properly KillDisk must be
launched under Super User account. So, if you are not a Super User, you should type a prefix sudo ,
or su (for different Linux versions) before each command.
After you have typed KillDisk and added command line parameters press Enter to complete the command
and start the process.
Information on how drives have been erased is displayed on the screen when the operation has completed
successfully. KillDisk execution behavior depends on either command line parameters (highest priority),
settings configured in interactive mode and stored in the settings file (lower priority), or default values
(lowest priority).
Related information
Batch Mode on page 54
Batch Mode
Note: This feature is intended for advanced users only
Batch Mode allows KillDisk to be executed in fully automated mode without any user interaction. All events
and errors (if any) are placed to the log file. This allows system administrators and technicians to automate
erase/wipe tasks by creating scripts (*.CMD, *.BAT files) for different scenarios that can be executed later on
in different environments.
To start KillDisk in batch mode just add the –bm (or -batchmode) command line parameter to the other
parameters and execute KillDisk either from the command prompt or from a custom script.
Here is an example of Batch Mode execution with the wipe command:
This command will wipe all deleted data and unused clusters on all attached physical disks without any
confirmations using most secure Peter Gutmann's method and control returns to the command prompt
when erase completes.
If –ns (-nostop) command line parameter is specified no user interaction is possible after erase/wipe
action started. So user cannot cancel the command being executed.
After command execution completed, application returns the following exit codes to the Operating System.
Return codes:
0 (Zero)
KillDisk returns Zero when all disks erased successfully
1 (One)
2 (Two)
KillDisk returns Two if erase/wipe has been completed, but minor warnings occurred
Related information
Command Line Mode on page 51
Advanced Tools
KillDisk offers a number of advanced tools to work in conjunction with the software to make operations
easier to perform and the disks easier to explore. KillDisk makes it possible to explore disks both on a file
level (in file Browser) and on a low level (in Hexadecimal Viewer). Disk health analysis can be performed
with S.M.A.R.T. monitor. Logs and reports export to the external databases is fully supported in KillDisk
Industrial version.
This section describes these features:
• File Browser
• Hexadecimal Viewer
File Browser
KillDisk includes a built-in File Browser to examine disks' surface for verification purposes, for proper disk
selection for the erase, and for deleted files validation after wipe. File Browser is able to preview volumes
and display files and folders located on all existing file systems used in Windows, Linux, Unix or Mac OS.
Note:
KillDisk detects existing files as well as files that have been deleted but NOT sanitized. They appear
in Gray color and indicate deleted files with a high probability of being recovered with a special file
recovery tools.
Another way is to use a keyboard shortcut which is Ctrl-B . This will open the File Browser window:
The File Browser tab displays files and folders on the disk being selected. Browsing over the folders tree
performed the same way as in Windows Explorer.
Grey files indicate deleted files have not been sanitized. These files are recoverable. Running KillDisk's Wipe
operation ensures these files are unrecoverable and make these gray files disappear from the File Browser.
Note:
Found deleted files appear in their original directory (before they were deleted). The ! Lost &
Found ! folder is a virtual directory created for deleted files which are found without directory
information.
Disk Viewer
Disk Viewer allows users to view the contents of connected drives on a sector's level in a hexadecimal, ASCII
and Unicode representations. Disk Viewer for the selected disk can be launched from the main view as well
as through the main menu bar. Shortcut is Ctrl-H .
Templates
KillDisk also offers a list of templates to help display volume structure on the disk by colored sections.
Example above displays what happens when NTFS volume is opened in the Disk Viewer. In this case NTFS
Boot Sector template has been attached automatically. Below is NTFS Boot Sector template details in
Templates view.
Low-level Search
Disk Viewer has an advanced search feature for locating specific data in sectors while low-level disk scan.
Click Find toolbar button to open Find Text dialog.
Find what
Input the characters you are searching for in ANSI, Hex or Unicode
Search direction
If you have an idea of where the data may be located specify where to search
Not
Search for characters that do not correspond to the Find what parameter
Ignore case
Disables case-sensitivity in text search
Use
Switch between Regular Expressions and Wildcards
Navigation
Disk Viewer's Navigate options simplify navigation on the disk. Click Navigate toolbar button to access
these options, which are:
Go to offset
Jumps to the particular offset that needs to be entered manually in a decimal or hexadecimal form
Go to sector
Jumps to the particular sector or cluster on the disk
Partition table
Jumps to the sector where partition table is located
Particular partition
Lists all partitions and allows to jump to the boot sectors, to the beginning and to the end of any
available partition
Settings File
When KillDisk changes its settings (erase method, certificate options, etc…) all the current values are
saved to the SETTINGS.XML file (older versions supported only KILLDISK.INI) at the location where KillDisk
executable resides. These settings used as default values the next time KillDisk runs.
KILLDISK.INI is a standard text file with the list of possessing sections, parameter names and values. All
KillDisk settings are stored in the [General] section. The latest version of KillDisk still supports settings
stored by previous versions in INI file. However, on first run it exports all settings to SETTINGS.XML file
and work with this file thereafter. Structure of SETTINGS.XML file is similar to KILLDISK.INI file, however
advanced XML file format being used.
For parameter storage the syntax being used is:
Parameter=value
Here is an example of an INI file:
[General]
excludeSystemDisk=false
initHD=true
initRD=true
initCD=false
initFD=false
defaultSerialDetectionMethod=2
clearLog=false
logPath=C:\\Program Files\\LSoft Technologies\\Active@ KillDisk Ultimate 11\\
logName=killdisk.log
logging=0
shutDown=false
saveToRemovable=false
showCert=true
killMethod=0
killVerification=false
killVerificationPercent=10
initDevice=true
fingerPrint=false
autoEject=false
skipConfirmation=false
wipeMethod=0
wipeVerification=false
wipeVerificationPercent=10
wipeUnusedCluster=true
wipeUnusedBlocks=false
wipeFileSlackSpace=false
wipeInHex=false
wipeUserPattern=Erased by Active@ KillDisk
wipeUserPasses=3
eraseInHex=false
killUserPattern=Erased by Active@ KillDisk
killUserPasses=3
accessDeniedCount=10
retryAtt=3
ignoreErrors=true
saveCert=true
certPath=C:\\Users\\Mikhail\\certificates\\
hideDefaultLogo=false
computerIDSource=0
showLogo=false
logoFile=
clientName=
companyName=
companyAddress=
companyPhone=
logComments=I hereby state that the data erasure has been carried out in
accordance with the instructions given by software provider.
technicianName=Technician
sendSMTP=false
attachCert=true
useDefaultAccount=true
fromSMTP=
toSMTP=
nameSMTP=
portSMTP=2525
authorizeSMTP=false
usernameSMTP= password
SMTP=
mapName=
mapPath=
mapUser=
mapPass=
When KillDisk is running in interactive mode all these parameters can be configured in Preferences on
page 64 accessed by clicking the Preferences menu item from Tools menu or by pressing F2 shortcut.
Settings can be changed manually by editing the SETTINGS.XML (or KILLDISK.INI) file in any text editor
(such as Notepad etc).
Here is an explanation of all settings supported:
When you start KillDisk with or without command line parameters its execution behavior depends on either
command line settings (highest priority), settings configured in interactive mode and stored in the settings
file (lower priority) or default values (lowest priority).
Default value means that if the settings file is absent or exists, but contains no required parameter, the
predefined (default) value is used.
Related information
Preferences on page 64
Preferences
KillDisk Preferences dialog is the central location where KillDisk features and settings can be configured.
To open Preferences dialog:
• From main menu choose Tools > Preferences...
or
• Press F2 keyboard shortcut at any time
Preferences dialog divided into several sections:
• General Settings on page 65
• Environment
• Sound Notifications
• Action Triggers
• Disk Erase
• Secure Erase
• Disk Wipe
• Erase Certificate
• Company Information
• Technical Information
• Processing Report
• Disk Label Presets
• Label Templates
• Disk Viewer
• Error Handling
• E-Mail Notifications
• SMTP Server Setting
Preferences allow to configure all the settings needed for the application proper operation.
General Settings
The General Settings section allows to configure general preferences as well as the applications' visual and
sound representation.
Computer ID
Configure how the KillDisk workstation is identified in logs & reports. Values are: None , BIOS Serial
Number , Motherboard Serial Number .
Environment
These are configurable options pertaining to the applications user interface and user experience.
Application style
Configures the color scheme used in the application. Values are: Blue , Olive , None (Use OS default)
and Silver .
Sound Notifications
These are configurable options related to application sounds: you can use either predefined values or
assign your own sounds (User defined sound file).
Use Sound Notifications
Toggles sound tones being used for notifying the user of the completion of a task, errors and
notification during an operation: Success , With Warnings , With Errors , Failure .
Action Triggers
Configure actions performed while application is running.
Automatically check for software updates
If this option set, application will check for a new update after every start up.
Export erase certificates and application log to all detected removable media
Upon erase completion all certificates and logs will be automatically exported to attached USB disks
(all detected media of removable type).
Disk Erase
The Disk Erase section provides settings' configuration for the KillDisk erase procedures.
Erase method
Choose one of more than 20 sanitizing methods including many international standards and custom
patterns.
Erase verification
Percentage of disk to be verified after disk erasure. The large percentage, the more time it takes to
verify written data.
Note:
In some erase methods such as the US DoD 5220.22-M this option is mandatory. After the
erase operation has completed this feature will scan the entire drive evenly and verify the
integrity of the erase operation. This option is the percent of the sectors to check across the
disk. Most standards specify 10% as an accurate sample size for the verification.
Erase confirmation
As a safety precaution to prevent accidental removal of disks' data KillDisk uses the user-typed
keyphrase mechanism just before the erase procedure is initiated (see below). By default this
precaution mechanism is initialized with the key phrase ERASE-ALL-DATA . The key phrase can be
modified, configured as a randomly generated set of characters or disabled. The keyphrase should
be typed correctly in order to start the erase procedure.
Related information
Erase Methods on page 103
Erase Disk Concepts on page 94
Disk Label Presets on page 78
Secure Erase
The Secure Erase section provides settings' configuration for the Solid State Drive (SSD) specific erase
procedures.
Verify erasure
Percentage of disk to be verified after Secure Erase completes.
Erase confirmation
As a safety precaution to prevent accidental removal of disks' data KillDisk uses the user-typed
keyphrase mechanism just before the erase procedure is initiated (see below). By default this
precaution mechanism is initialized with the key phrase ERASE-ALL-DATA . The key phrase can be
modified, configured as a randomly generated set of characters or disabled. The keyphrase should
be typed correctly in order to start the erase procedure.
Related tasks
Secure Erase on page 30
Related information
Secure Erase (SSD) on page 124
Secure Erase Concepts on page 96
Secure Erase (ANSI ATA, SE) on page 105
Disk Wipe
The Disk Wipe section provides settings' configuration for Wipe procedure and allows you to specify the
erase method to use, verification and a few additional wipe-specific options.
Erase method
Choose one of more than 20 sanitizing methods including many international standards and custom
patterns.
Verify erasure
Percentage of disk to be verified after wiping out unused disks' clusters.
Related information
Erase Methods on page 103
Wipe Disk Concepts on page 98
Disk Label Presets on page 78
Erase Certificate
Erase Certificates section configures options for appearance and storage of certificates in PDF format. If
Use Erase Certificate check box is selected, PDF certificates will be created and available for the immediate
printing and storage for future use. Certificates can be customized with Company Information on page
74, Technician Information on page 74 and other information.
Use this option to include S.M.A.R.T. information section for the disk being erased.
Print Options
Always print certificate after disk erase
Prints erase certificate after erase completion automatically.
Default printer
Select a default printer for printing erase certificates.
Barcode
If Include Barcode check box is selected, a barcode section has been added to the certificate in desired
format. Barcode section includes the following options:
Barcode data
Is a string of available tags and attributes concatenated by ^ (CARET) delimiter. User is able to
compose a custom string with selected values from drop-down list or by simple typing.
Preview
Shows the composed data representation. Barcode data encoded to the actual barcode.
Barcode format
There is a drop-down list of available barcode formats.
Encoding
There is a drop-down list of available encoding schemes for the particular barcode format. The
selected encoding is used to encode the barcode data.
Note:
Barcodes and QR Codes embedded to Certificates are available in KillDisk Industrial only.
Certificate location
Use this option to save erase certificate as a file in PDF format to the selected location.
Digital Signature can be displayed as an overlay text on the first page of the certificate. After you
turn this option on, you can specify overlay text using tags (see tags section) and configure signature
position on the first page, rectangle dimensions and text size.
Related information
Name Tags on page 113
Company Information
Company Information section allows to configure business specific information for Erase Certificates,
Processing Reports and Disk Labels.
To specify a Company Logo image use the Set button. Select a desired logo image file. Most of the image
formats are supported: JPEG, TIFF, BMP and PNG. The logo is previewed in the Company Logo space.
Tip:
It is recommended to use company logo with resolution suitable for printing (300dpi) with a side
not exceeding 300px.
Add company's information to the related fields: Licensed to , Business name , Location , Phone , Disclaimer .
When the Add company supervisor signature field to certificate check box is marked the related field is
added to the certificate.
Related information
Erase Certificate on page 70
Processing Report on page 75
Technician Information
Technician Information section allows to configure a specific technician information for Erase Certificates,
Processing Reports and Disk Labels.
Processing Report
Processing Report section allows to configure the XML reports generated by KillDisk after operation is
complete.
Report location
Define a template for the file name for the reports. The main tags available are:
Adds the company information (defined in Company Information) into the XML erasure report.
Adds the technician information (defined in Technician Information) into the XML erasure report.
Ensures that the system-specific information is saved in the XML report, such as:
• Operating system
• Kernel version
• Architecture (x86, x64)
Ensures that the system-specific information is saved in the XML report, such as:
• Motherboard manufacturer
• Motherboard description
• Host (name, domain)
• CPU (logical, physical)
• Memory
Adds the information about disk health based on S.M.A.R.T. attributes into the XML erasure report.
Note:
If internal tag <task> is present, Results are appeared inside.
Related information
Name Tags on page 113
Label preset
Displays and let you select a default Label Preset or create a new one. Click Add New Label Preset button
to create a custom label preset with your own specifications. Click Delete button to delete the
selected label preset .
Label title
Sets a title to be printed (in bold) at the top of the labels. It can be a company name, batch name or any
other descriptors you may consider useful to identify the operation. Static text can be typed in or any
dynamic attributes (tags) can be inserted at current cursor's position. Click Insert Name Tag button to
insert predefined tag from the drop-down list.
Label area
Label's content for the preset. Static text can be typed in or any dynamic attributes (tags) can be inserted at
current cursor's position. Click Insert Name Tag button to insert predefined tag from the drop-down
list. Click Clear Pattern button to empty all label's area.
Label attributes
You can use RTF formatting and set Word Wrapping behavior using related check boxes.
Add signature line
Adds a line at the bottom of the label for the technician to sign off on upon completion of the
operation.
Label preview
Displays a preview of the label with the current input settings. Refreshes automatically when any
adjustments are made to the settings.
Barcode options
Selecting Append barcode check-box will print QR Code or Barcode on the label to be able to be scanned
thereafter for third party inventory database
Barcode data
String including essential erase parameters to be encoded and transformed to QR Code or Barcode.
Static text can be typed in or any dynamic attributes (tags) can be inserted at current cursor's
position. Click Insert Name Tag button to insert predefined tag from the drop-down list.
Preview
Displays a preview of encoded string with the current input settings. Refreshes when any
adjustments are made to the settings.
Format
List of supported QR Code and Barcode formats. Currently supported: Aztec 2D barcode , Code 39
1D , Code 93 1D , Code 128 1D , QR Code . Note that different types of Barcodes can accept different
size of encoded string.
Encoding
If barcode string contains symbols other than English letters, you can specify encoding (code page)
for the particular language.
Size, mm
Size in millimeters for the Barcode/QR Code to be printed on the label.
Note:
Barcodes and QR Codes embedded to Disk Labels are available in KillDisk Industrial only.
Print options
Define options for label printing including special label printers (Brother QL-700, etc):
Default printer
Define printer to be used exclusively to print labels from the list of installed printers.
Print test label command let you print Disk Label sample to verify your settings and selected layout
attributes.
Disk Label Templates dialog gives you an access to a number of predefined standard templates and to any
custom templates you can create. These templates may be easily selected without opening any additional
dialogs. The details of the selected template are displayed below the selection box. If your custom labels
differ from any of the templates available, the button allows you to create a custom template with your
own specifications. Additionally, the button allows you to modify an existing template and the
button deletes the selected template.
To open a Template Editor, click the button on the Disk Label Templates dialog .
Template title
Sets a custom title for your template. This is the name to refer this template when selecting it in the
Print Label dialog.
Page
Specify the dimensions of the page being used to print the labels. Select page size from the list of
standard sizes or define custom size using exact measurements. Define page orientation.
Page margins
Page margins are defined for the top, bottom, left and right sides of the page.
Label layout
Define how the labels appear on the page. Define the spacing in between labels on the page and the
dimensions of the label grid. Once you entered the proper measurements, KillDisk takes care of all
formatting.
Size units
The units of measurement may vary between millimeters, inches, pixels and points. If a value is
entered in one measurement and then size unit is changed, the appropriate conversion takes place.
Related information
Name Tags on page 113
Disk Viewer
Disk Viewer section allows to set hexadecimal view settings, font and user interaction parameters.
Hexadecimal offsets
Toggles offset format between decimal and hexadecimal.
Lines to scroll
Number of lines to scroll for a single mouse wheel sweep.
Pages to scroll
Number of pages to skip for a single Page Up or Page Down .
Font name
Select any mono-space font from the list of available ones for better view experience.
Font size
Font size to be used in hexadecimal display.
Error Handling
Error Handling section has the advanced settings to configure error handling while erasing or cloning the
data.
E-mail Notifications
E-mail Notifications sections allows to configure how client can be notified after operation is complete.
KillDisk can deliver results of its sanitation process (certificates, reports, logs) by e-mail.
Send to
Type e-mail address where erasing/wiping reports will be sent to.
E-mail attachments
Certificate, XML Report or Log File can be emailed, just mark the related check box.
Note:
E-mail notifications feature is accessible in commercial packages only.
When you mark Use E-Mail Notifications check box, the SMTP Server Settings section becomes accessible
for the configuration.
Account type
KillDisk offers you a free SMTP account located on www.smtp-server.com that can be used for
sending reports out. By default all the required parameters are filled up and configured properly.
If your corporate policy does not allow using services other than its own you need to switch this
option to the Custom Account and configure all the settings manually. Ask your system/network
administrator to get these parameters.
From
Type e-mail address which you expect these reports to come from.
Connection type
Select encryption type to use: No encryption , SSL or TLS .
SMTP server
KillDisk offers you the use of smtp-server.com for a free SMTP account. This account is pre-
configured for KillDisk users. Ask your system/network administrator to get the proper SMTP server
domain to be used.
SMTP port
For the free SMTP account KillDisk allows you to use smtp-server.com on port 80. This is a standard
port being used by all web browsers to access the Internet. This port most likely is open on a
corporate and home networks. Other ports can be filtered by and restricted by a network firewall.
Ask your system/network administrator to set up a proper SMTP port for the custom SMTP server.
Troubleshooting
In the events of technical difficulties with KillDisk you may choose to either troubleshoot the system
yourself or, within an active maintenance period (you receive 1 year free with your purchase), you can
contact our support team. Attach your application log and hardware configuration (hardware diagnostic
file) with your support request.
Related information
Common Tips on page 86
Application Log on page 87
Hardware Diagnostic File on page 89
Common Tips
Common Problems
Disk data can not be erased
Ensure that disk is fully functional (no physically damages) and is accessible by Operating System.
Ensure you are not erasing the system disk or the disk KillDisk launched from (application won't let
you erase these disks).
Stop erase operation as soon as possible. Once the data completely sanitized, it won't longer be
accessible. Use a tool like Active@ File Recovery (https://www.file-recovery.com) to recover remains
of data that has not been sanitized yet.
Application Log
Application Log View reflects every action taken by the application and displays messages, notifications
and other service information. Use these messages to observe and analyze erase processes.
To open Application Log View do one of the following:
• Click Tools > Application Log from the main menu
• Press F8 keyboard shortcut
Once Application Log View is open and active, you can use toolbar buttons and the context menu to
perform the following tasks:
Save log as
Opens a standard Save As dialog. Save the actual application log file to the local disk Default is .LOG
file extension.
Maximum details
Shows advanced entries related to the application behavior and data analysis.
Text size
Changes text size to Large, Normal or Small.
Expand All
Expands all collapsed log nodes.
Collapse All
Collapses all log nodes.
Clear
Clear the log for the current application session.
Tip:
We recommend that you attach a copy of the log file to all requests made to our technical support
group. The entries in this file will help us to resolve certain issues.
Note:
To save time on initial contact with our technical support staff we highly recommend that you
submit a hardware diagnostic file, otherwise, most likely, it will be requested from you by our
support team later on.
Related information
Application Log on page 87
Appendix
2) 14 TB (Western Digital manufactured in 2019) SATA III (6 Gbps) 7200 rpm disk with One Pass Zeros and
US DoD 5220.22-M (3 passes + 10% verification) showing the average speed of 12 GB/min per pass
Most official guidelines regarding the disposal of confidential magnetic data do not take into account the
depth of today's recording densities nor the methods used by the OS when removing data.
Removal of confidential personal information or company trade secrets in the past might have been
performed using the FORMAT command or the FDISK command. Using these procedures gives users a
sense of confidence that the data has been completely removed.
When using the FORMAT command Windows displays a message like this: Formatting a disk
removes all information from the disk.
Actually the FORMAT utility creates new empty directories at the root area, leaving all previous data on the
disk untouched. Moreover, an image of the replaced FAT tables is stored so that the UNFORMAT command
can be used to restore them.
FDISK merely cleans the Partition Table (located in the drive's first sector) and does not touch anything else.
Moreover, most of hard disks contain hidden zones (disk areas that cannot be accessed and addressed on a
logical access level). KillDisk is able to detect and reset these zones, cleaning up the information inside.
Sanitization Types
NIST 800-88 international security standard (Guidelines for Media Sanitization) defines different types of
sanitization.
Regarding sanitization, the principal concern is ensuring that data is not unintentionally released. Data is
stored on media, which is connected to a system. Simply data sanitization applied to a representation of the
data as stored on a specific media type.
When media is re-purposed or reaches end of life, the organization executes the system life cycle
sanitization decision for the information on the media. For example, a mass-produced commercial software
program contained on a DVD in an unopened package is unlikely to contain confidential data. Therefore,
the decision may be made to simply dispose of the media without applying any sanitization technique.
Alternatively, an organization is substantially more likely to decide that a hard drive from a system that
processed Personally Identifiable Information (PII) needs sanitization prior to Disposal.
Disposal without sanitization should be considered only if information disclosure would have no impact
on organizational mission, would not result in damage to organizational assets, and would not result in
financial loss or harm to any individuals. The security categorization of the information, along with internal
environmental factors, should drive the decisions on how to deal with the media. The key is to first think
in terms of information confidentiality, then apply considerations based on media type. In organizations,
information exists that is not associated with any categorized system. Sanitization is a process to render
access to target data (the data subject to the sanitization technique) on the media infeasible for a given
level of recovery effort. The level of effort applied when attempting to retrieve data may range widely. NIST
SP 800-88 Rev. 1 Guidelines for Media Sanitization Clear, Purge, and Destroy are actions that can be taken
to sanitize media. The categories of sanitization are defined as follows:
Clear
Clear applies logical techniques to sanitize data in all user-addressable storage locations for protection
against simple non-invasive data recovery techniques; typically applied through the standard Read and
Write commands to the storage device, such as by rewriting with a new value or using a menu option to
reset the device to the factory state (where rewriting is not supported).
For HDD/SSD/SCSI/USB media this means overwrite media by using organizationally approved and
validated overwriting technologies/methods/tools. The Clear pattern should be at least a single write
pass with a fixed data value, such as all zeros. Multiple write passes or more complex values may
optionally be used.
KillDisk supports Clear sanitization type through the Disk Erase command for all R/W magnetic types of
media, more than 20 international sanitation methods including custom patterns implemented and can
be used.
Purge
Purge applies physical or logical techniques that render Target Data recovery infeasible using state of the
art laboratory techniques.
For HDD/SSD/SCSI/USB media this means ATA SECURE ERASE UNIT, ATA CRYPTO SCRAMBLE EXT, ATA
EXT OVERWRITE, ATA/SCSI SANITIZE and other low-level direct controller commands.
KillDisk supports Purge sanitization type through the Secure Erase command only for media types
supporting ATA extensions.
Destroy
Destroy renders Target Data recovery infeasible using state of the art laboratory techniques and results in
the subsequent inability to use the media for storage of data due to physical damages.
For HDD/SSD/SCSI media this means Shred, Disintegrate, Pulverize, or Incinerate by burning the device in
a licensed incinerator.
It is suggested that the user categorize the information, assess the nature of the medium on which it
is recorded, assess the risk to confidentiality, and determine the future plans for the media. Then, the
organization can choose the appropriate type(s) of sanitization. The selected type(s) should be assessed
as to cost, environmental impact, etc., and a decision should be made that best mitigates the risk to
confidentiality and best satisfies other constraints imposed on the process.
which slows down the process of recording new data. In theory, there shouldn’t be such problems, because
TRIM exists - a command to clear the data marked for deletion in cells. This command only works with
2.5” and M.2 SATA drives. For drives connected to the PCIe bus (M.2 or PCIe on the motherboard) there is
an analogue - Deallocate. But it happens that these functions are disabled for some reason - an OS error,
a user error in setting up a disk through third-party software, or the use of non-standard OS assemblies
with unknown software components. So, the disk starts to work noticeably slower and it is quite noticeable
without any benchmark performance measurements.
SSDs use a number of mapping layers that hide the physical layout of the flash-based memory, as well as
help in managing how flash memory data integrity and lifetime are managed. Collectively, these layers are
referred to as the Flash Translation Layer (FTL).
SSDs are also over-provisioned: they contain a bit more flash memory than what they’re rated for. This extra
memory is used internally by the FTL as empty data blocks, used when data needs to be rewritten, and as
out-of-band sections for use in the logical to physical mapping.
The mapping layers, and how the flash controller manages memory allocation, pretty much ensure that
either erasing or performing a conventional hard drive type of secure erase won’t ensure all data is
overwritten, or even erased at all.
One example of how data gets left behind intact is due to how data is managed in an SSD. When you edit a
document and save the changes, the saved changes don’t overwrite the original data (an in-place update).
Instead, SSDs write the new content to an empty data block and then update the logical to physical map
to point to the new location. This leaves the space the original data occupied on the SSD marked as free,
but the actual data is left intact. In time, the data marked as free will be reclaimed by the SSD’s garbage
collection system, but until then, the data could be recovered.
A conventional Secure Erase, as used with hard drives, is unable to access all of the SSD’s memory location,
due to the FTL and how an SSD actually writes data, which could lead to intact data being left behind.
SSD manufacturers understand the need for an easy way to sanitize an SSD, and most have implemented
the ATA command, Secure Erase Unit (used with SATA-based SSDs), or the NVMe command, Format NVM
(used with PCIe-based SSDs) as a fast and effective method of securely erasing an SSD.
So, SSD drives have a non-trivial system of work, therefore, the scheme for the complete destruction of
data should also not be the easiest. But in reality, this is not so at all. Any SSD has a controller that is the
"brain" of the drive. He not only tells the system where to write data, but also encrypts the information
passing through it and stores the key with himself. If you remove (or rather replace) a given key, then all the
information will turn into a random set of 1 and 0 - it will be impossible to decrypt it in any way. Just one
simple action by the user can solve the problem of safe data erasure. This method is the fastest and most
effective.
Note:
To protect information that is critical, both for serious organizations that are concerned about
the safety of data and for public sector enterprises working with information classified as state
secrets, information systems should usually use certified sanitation algorithms (US DoD 5220.22-M,
Canadian OPS-II, NSA 130-2 etc.).
If you combine these two methods (replacing the key and resetting the cells), you get the perfect algorithm
for obtaining a completely sterile disk in the state of its maximum performance. This, firstly, solves the
problem that we raised at the very beginning, and, secondly, it can help us answer the question about the
degree of drive wear.
It is important to note that some drives with built-in encryption can receive only one algorithm upon
receipt of a safe erase command - it depends on the controller settings by the manufacturer. If you "reset"
your SSD and compare the actual performance with the declared one, you will get the answer to this
question. This procedure does not affect disk wear (which is very important). Note that these actions are
designed specifically for analyzing the state of the disk, but it will not be possible to achieve a long-term
increase in the read/write speed due to the peculiarities of the operation of SSD disks - the situation may
depend on both the drive model and the controller firmware. And it must be noted that not all drives
support encryption. In this case, the controller simply resets the cells.
Wipe Algorithms
The process of deleting files does not eliminate them from the hard drive. Unwanted information may still
be left available for recovery on the computer. A majority of software that advertises itself as performing
reliable deletions simply wipes out free clusters. Deleted information may be kept in additional areas of a
drive. KillDisk therefore offers different wipe algorithms to ensure secure deletion: overwriting with zeros,
overwriting with random values, overwriting with multiple passes using different patterns and much more.
KillDisk supports more than 20 international data sanitizing standards, including US DoD 5220.22M and
the most secure Gutmann's method overwriting with 35 passes.
The MFT file contains records, describing every file on the volume. During the deletion of these files,
the records of their deletion are left untouched - they are simply recorded as "deleted". Therefore file
recovery software can use this information to recover anything from the name of the file and the structure
of the deleted directories down to files smaller than 1Kb that are able to be saved in the MFT directly.
The algorithm used by KillDisk wipes all of the unused information out of the MFT records and wipes the
unusable space, making a recovery process impossible.
In this example all deleted records removed and root folder defragmented.
Figure 54: FAT Directory after Wipe
In the event of the deletion of a file or folder, there is a possibility of recovering the metadata of the file,
(such as its name and attributes), as well as the actual data that the file consists of. KillDisk's Wipe method
clears out all of this free space in the system files.
Erase Methods
US DoD 5220.22-M
The write head passes over each sector three times. The first time with zeros 0x00, second time with 0xFF
and the third time with random characters. There is one final pass to verify random characters by reading .
Canadian OPS-II
The write head passes over each sector seven times (0x00, 0xFF, 0x00, 0xFF, 0x00, 0xFF, random). There is
one final pass to verify random characters by reading.
US Army AR380-19
The write head passes over each sector three times. The first time with 0xFF, second time with zeros 0x00
and the third time with random characters. There is one final pass to verify random characters by reading.
NAVSO P-5329-26 RL
RL method - the write head passes over each sector three times: 0x01, 0x27FFFFFF, Random. There is one
final pass to verify random characters by reading.
NCSC-TG-025
The write head passes over each sector three times: 0x00, 0xFF, Random. There is one final pass to verify
random characters by reading.
NSA 130-2
The write head passes over each sector two times: Random, Random. There is one final pass to verify
random characters by reading.
NIST 800-88
Supported three NIST 800-88 media sanitation standards:
• 1. The write head passes over each sector one time (0x00).
• 2. The write head passes over each sector one time (Random).
• 3. The write head passes over each sector three times (0x00, 0xFF, Random).
For details about this,the most secure data clearing standard, you can read the original article at the link
below: http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_with-errata.pdf
German VSITR
The write head passes over each sector seven times.
Bruce Schneier
The write head passes over each sector seven times: 0xFF, 0x00, Random, Random, Random, Random,
Random. There is one final pass to verify random characters by reading.
Peter Gutmann
The write head passes over each sector 35 times. For details about this, the most secure data clearing
standard, you can read the original article: http://www.cs.auckland.ac.nz/%7Epgut001/pubs/se
%0Acure_del.html
Australian ISM-6.2.93
The write head passes over each sector once with random characters. There is one final pass to verify
random characters by reading.
User Defined
User indicates the number of times the write head passes over each sector. Each overwriting pass is
performed with a buffer containing user-defined or random characters. User Defined method allows to
define any kind of new erase algorithms based on user requirements.
How to place a registered Active@ KillDisk into a WinPE image for use in a network PXE boot
environment
Note:
To modify WinPE image (WIM) you need to have Windows ADK installed.
1. Start the Boot Disk Creator form Windows Start menu and prepare a bootable media. For KillDisk
settings fill in the data on App Config page.
Let's assume that the Boot Disk media has an F: letter in our environment.
2. Run Command Prompt as an Administrator.
3. Create an empty directory C:\MOUNT and mount BOOT.WIM file using the DISM tool:
Command: Dism /mount-image /imagefile:F:\sources\boot.wim /index:1 /mountdir:C:\mount
4. Replace BOOTDISK.KEY in C:\MOUNT directory with BOOTDISK.KEY located at the root of Boot Disk
media (F:\ BOOTDISK.KEY). This file is required and contains user's registration information.
5. Copy your company logo file from Boot Disk media (located F:\_kd\images1.jpg) to C:\MOUNT directory.
6. Open settings.xml file on Boot Disk media (F:\_kd\settings.xml) for edit using Notepad. Change path for
your company logo file to X:\
8. Dismount the BOOT.WIM image and commit the changes you applied:
Command: Dism /Unmount-Image /MountDir:C:\mount /commit
How to load Active@ KillDisk over the network via PXE environment on Windows Server platform
1. Add roles Windows Deployment Services.
2. Configure the WDS server, but don’t add images in WDS Configuration Wizard.
3. Add Windows PE image with Active@ KillDisk software Boot.wim in Boot Images on WDS server.
4. In properties of WDS server in Boot tab add our image as default boot image for x64 architecture.
5. Configure the DHCP server for work with WDS server.
For more detailed instructions, read Microsoft TechNet official documentation.
How to load Active@ KillDisk over the network via PXE environment on a Windows 10 computer
There are several steps required to do this: configuring the WinPE WIM, Boot Manager and PXE Server.
For the configuration steps, let's assume that inserted Boot Disk has a F: letter in our configuration
environment.
• Copy the PXE boot files from the mounted \BOOT folder of the Active@ Boot Disk boot.wim to the
\BOOT folder on PXE/TFTP server. For example:
Command: copy C:\mount\windows\boot\pxe\*.* y:\boot
Note:
To mount/dismount the boot.wim file, see section “How to place a registered Active@
KillDisk into a Windows PE image for use in a network PXE boot environment”.
• After dismounting the boot.wim, copy the bootable Windows PE image (F:\ Sources\boot.wim) to
the \BOOT folder on PXE/TFTP server.
• Copy the file boot.sdi (F:\Boot\boot.sdi) to the \BOOT folder on PXE/TFTP server.
Step 2: Configure boot configuration
• On a Windows 10 computer or in a Windows PE environment, create a BCD store using the
BCDEdit tool.
• In the BCD store, configure the RAMDISK, BOOTMGR and OS Loader settings for the Windows PE
image.
• Copy the BCD file to the \BOOT folder on PXE/TFTP server.
• Configure your PXE/TFTP server and DHCP server to point PXE clients to download PXEBoot.com or
PXEBoot.n12.
These are a few of the files that were copied over to the server in Step 1
For more details, see “Creating a BCD file for PXE boot” below.
• Configure your DHCP settings. You may copy the ones below, just make sure the address it binds to
is a static IP address from your router. Under IP Pool 1st addr, input the first available IP address in
your routers IP pool settings.
• Configure your TFTP settings. You may also copy the setting below. Again, make sure the IP address
is your router’s static IP and the TFTP server root directory is the one you configured in Step 1.
4. Configure BOOTMGR settings (remember to replace GUID1 in the third command with your GUID):
bcdedit /store c:\BCD /create {bootmgr} /d "boot manager"
bcdedit /store c:\BCD /set {bootmgr} timeout 30
bcdedit /store c:\BCD -displayorder {bb254249-93e9-11e7-84cb-6c71d9da760e} -addlast
6. Your PXE/TFTP server is now configured. You can view the BCD settings that have been configured using
the command:
bcdedit /store <BCD file location> /enum all
Note:
Your GUID will be different than the one shown above.
Example below shows how to customize a Boot Disk (WinPE image) containing KillDisk to change a default
Erase Method and to add a Company Logo.
1. Create settings file
Create custom KILLDISK.INI file using documented parameters (Application Settings).
Here is an example of an INI file which uses US DoD 5220.22-M (ECE) erase method with 10%
verification, stores logs, reports and certificates to X:\\ location (X: virtual drive is the only known drive
with guaranteed letter when boot disks starts), specifies Company Name and Logo Image file:
[General]
killMethod=3
killVerification=true
killVerificationPercent=10
logName=X:\\killdisk.log
showCert=true
saveCert=true
certPath=X:\\
showLogo=true
logoFile=X:\\MyCompanyLogo.png
companyName=LSoft.NET
@ECHO OFF
FOR %%i IN (c d e f g h i j k l m n o p q r s t u v w y z) DO (IF EXIST %%i:\user_files\KILLDISK.INI ( SET
CDROM=%%i:&& GOTO END ))
:END
copy %CDROM%\user_files\MyCompanyLogo.png X:\
KillDisk.exe -ip="%CDROM%\user_files"
Select a Target
Select a media for Boot Disk to be created on (CD/DVD/BD ROM, ISO image or USB drive) and click
Next .
Related tasks
Create a Boot Disk on page 19
Related information
Settings File on page 60
Command Line Mode on page 51
Name Tags
General
{Computer ID}
Workstation (computer) ID
{OS}
Operating System name
{AppName}
Application name
{AppVersion}
Application full version
{KernelVersion}
Kernel version
{UniqueID}
Generated unique 8 symbols ID
Disk
Values for these name tags retrieved from the context device:
{Serial ID}
Disk serial number, retrieved from OS or from S.M.A.R.T. attributes
{Platform ID}
Disk platform identification (may be vary due to OS format)
{Product ID}
Disk manufacturer Id
{Model}
Disk model name (if available)
{Size}
Disk size in gigabytes
{Sectors}
Disk size in sectors
Processing attributes
Disk processing attributes based on execution conditions:
{Method}
Erase method
{Passes}
Erases passes description
{Verified}
Verification attribute
{DateStarted}
Process start date
{TimeStarted}
Process start time
{TimeElapsed}
Process elapsed time
{Status}
Overall completion status for group processing or separate disk processing status.
{StatusCode}
Overall process result digital code
Virtual Disks
KillDisk provides full support for Virtual Disks - dynamic disks created and managed by:
• Logical Disk Manager (LDM on Windows)
• Logical Volume Manager (LVM on Linux)
• Windows Storage Spaces (WSS on Windows)
Virtual Disks are virtual devices which look like regular physical disks to all applications. These virtual
devices are stored on one or more physical disks and emulate different types of volumes and RAID disk
arrays not on a hardware level (inside disk controller), but on Operating System level (software emulation).
Virtual devices are fully supported by the KillDisk. These disks will appear in Local Devices view like any
other regular disks. When you launch an erase for the virtual disk, the progress is displayed in the same
color on all components of the composite virtual drive.
The HPA is useful only if other software or firmware (e.g. BIOS) is able to use it. Software and firmware
that are able to use the HPA are referred to as 'HPA aware'. The ATA command that these entities use is
called READ NATIVE MAX ADDRESS. This command accesses a register that contains the true size of the
hard drive. To use the area, the controlling HPA-aware program changes the value of the register read by
IDENTIFY DEVICE to that found in the register read by READ NATIVE MAX ADDRESS. When its operations
are complete, the register read by IDENTIFY DEVICE is returned to its original fake value.
• HPA is also used by various theft recovery and monitoring service vendors. For example, the laptop
security firm Computrace use the HPA to load software that reports to their servers whenever the
machine is booted on a network. HPA is useful to them because even when a stolen laptop has its
hard drive formatted the HPA remains untouched.
• HPA can also be used to store data that is deemed illegal and is thus of interest to government and
police.
• Some vendor-specific external drive enclosures (Maxtor) are known to use HPA to limit the capacity
of unknown replacement hard drives installed into the enclosure. When this occurs, the drive may
appear to be limited in size (e.g. 128 GB), which can look like a BIOS or dynamic drive overlay
(DDO) problem. In this case, one must use software utilities (see below) that use READ NATIVE MAX
ADDRESS and SET MAX ADDRESS to change the drive's reported size back to its native size, and
avoid using the external enclosure again with the affected drive.
• Some rootkits hide in the HPA to avoid being detected by anti-rootkit and antivirus software.
• Some NSA exploits use the HPA for application persistence.
Glossary
BIOS Settings
Basic Input Output Subsystem is the program a personal computer's microprocessor uses to get the
computer system started after you turn it on. It also manages data flow between the computer's operating
system and attached devices such as the hard disk, video adapter, keyboard, mouse and printer. A typical
method to access the BIOS settings screen is to press Delete / F1 / F2 / F8 / F10 or Esc during the boot
sequence.
BCD
Boot Configuration Data. Firmware-independent database for boot-time configuration data. It is used by
Microsoft's new Windows Boot Manager and replaces the boot.ini that was used by NTLDR.
Boot Priority
BIOS settings allow you to run a boot sequence from a floppy drive, a hard drive, a CD/DVD/BD drive or a
USB device. You may configure the order that your computer searches these physical devices for the boot
sequence. The first device in the order list has the first boot priority. For example, to boot from a CD/DVD/
BD drive instead of a hard drive, place the CD/DVD/BD drive ahead of the hard drive in priority.
Boot Record
See MBR for Master Boot Record - located in the physical disk's first sector. Each volume on the disk has its
own Boot Record called Volume or Partition Boot Sector, the content is file system specific.
Boot Sector
The boot sector continues the process of loading the operating system into computer memory. It can be
either the MBR or the Partition Boot Sector.
Compressed Cluster
When you set a file or folder property to compress data, the file or folder uses less disk space. While
the size of the file is smaller, it must use a whole cluster in order to exist on the hard drive. As a result,
compressed clusters contain file slack space. This space may contain residual confidential data from the file
that previously occupied this space. KillDisk can wipe out the residual data without touching the existing
data.
CSV File
A comma-separated values (CSV) file is a delimited text file that uses a comma to separate values. Each line
of the file is a data record. Each record consists of one or more fields, separated by commas. The use of the
comma as a field separator is the source of the name for this file format. A CSV-file typically stores tabular
data (numbers and text) in plain text, in which case each line will have the same number of fields.
Data Cluster
A cluster or allocation unit is a unit of disk space allocation for files and directories. To reduce the overhead
of managing on-disk data structures, the file system does not allocate individual disk sectors by default,
but contiguous groups of sectors, called clusters. A cluster is the smallest logical amount of disk space that
can be allocated to hold a file. Storing small files on a file system with large clusters will therefore waste
disk space; such wasted disk space is called slack space. For cluster sizes which are small versus the average
file size, the wasted space per file will be statistically about half of the cluster size; for large cluster sizes,
the wasted space will become greater. However, a larger cluster size reduces bookkeeping overhead and
fragmentation, which may improve reading and writing speed overall. Typical cluster sizes range from 1
sector (512 B) to 128 sectors (64 Kb). The operating system keeps track of clusters in the hard disk's root
records or MFT records, see Lost Cluster.
Device Node
Device node in the Local System Devices list is a physical device containing logical drives. The first physical
device on older versions of Operating Systems is named 80h, now more typical name is PhysicalDrive0.
Exclusive Access
Lock is applied to a partition for exclusive writing access. For example, while recovering deleted or
damaged files or folders, the recovery application must have exclusive access to the target partition while
recovering files. If another application or the operating system are using the target partition - the processes
could interfere, so user/process must close all applications or system processes that may be using the
target partition before locking it.
FAT
File Allocation Table. Area that contains the records of every other file and directory in a FAT-formatted disk
drive. The operating system needs this information to access the files. There are FAT32, FAT16 and exFAT
versions. FAT file systems are still commonly found on flash disks and other memory cards and modules
(including USB flash drives), as well as many portable and embedded devices. FAT is the standard file
system for digital cameras per the DCF specification.
FTP
File Transfer Protocol. This is a standard network protocol used for the transfer of computer files between a
Client and Server on a computer network. FTP is built on a client-server model architecture using separate
control and data connections between the client and the server. FTP users may authenticate themselves
with a clear-text sign-in protocol, normally in the form of a username and password, but can connect
anonymously if the server is configured to allow it. For secure transmission that protects the username and
password, and encrypts the content, FTP is often secured with SSL/TLS (FTPS) or replaced with SSH File
Transfer Protocol (SFTP). The first FTP client applications were command-line programs developed before
operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux
operating systems. Many FTP clients and automation utilities have since been developed for desktops,
servers, mobile devices, and hardware, and FTP has been incorporated into productivity applications, such
as HTML editors.
Free Cluster
A cluster that is not occupied by a file. This space may contain residual confidential data from the file that
previously occupied this space. KillDisk can wipe out the residual data.
FreeDOS
A free operating system for PC compatible computers. It intends to provide a complete DOS-compatible
environment for running legacy software and supporting embedded systems. FreeDOS can be booted from
a floppy disk or USB flash drive. It is designed to run well under virtualization or x86 emulation. Unlike most
versions of MS-DOS, FreeDOS is composed of free and open-source software, licensed under the terms of
the GNU General Public License.
iSCSI
Internet Small Computer Systems Interface. iSCSI is a transport layer protocol that works on top of the
Transport Control Protocol (TCP). It enables block-level SCSI data transport between the iSCSI initiator and
the storage target over TCP/IP networks.
ISO
An International Organization for Standardization ISO-9660 file system is a standard CD-ROM file system
that allows you to read the same CD-ROM whether you're on a PC, Mac, or other major computer platform.
Disk images of ISO-9660 file systems (ISO images) are a common way to electronically transfer the contents
of CD-ROMs. They often have the file name extension .ISO (though not necessarily), and are commonly
referred to as "ISO".
Logical Drive
A partition is a logical drive because it does not affect the physical hard disk other than the defined space
that it occupies, yet it behaves like a separate disk drive.
Lost Cluster
A cluster that has an assigned number in the file allocation table, even though it is not assigned to any file.
You can free up disk space by reassigning lost clusters. In DOS and Windows you can find lost clusters with
the ScanDisk utility.
MBR
Master Boot Record. All physical disks start with MBR. When you start the computer, the code in the MBR
executes before the operating system is started. The location of the MBR is always track (cylinder) 0, side
(head) 0, and sector 1. The MBR contains a partition table with file system identifiers.
MFT Records
Master File Table. A file that contains the records of every other file and directory in the NTFS-formatted
volume. The operating system needs this information to access the files.
Named Streams
NTFS supports multiple data streams where the stream name identifies a new data attribute on the file. A
handle can be opened to each data stream. A data stream, then, is a unique set of file attributes. Streams
have separate opportunistic locks, file locks, and sizes, but common permissions.
NTFS
New Technology File System (developed by Microsoft) is the file system that the Windows NT operating
system uses for storing and retrieving files on a hard disk. NTFS is the Windows NT equivalent of the
Windows 95 file allocation table (FAT) and the OS/2 High Performance File System (HPFS). All the latest
Windows Operating Systems (Windows Vista, Windows 7, Windows 10) still use NTFS as a default file
system.
NTLDR
Aka NT loader is the boot loader for all releases of Windows NT operating system up to and including
Windows XP and Windows Server 2003. NTLDR is typically run from the primary hard disk drive, but it can
also run from portable storage devices such as a CD/DVD or USB flash drive.
OpenSUSE
A Linux distribution. It is widely used throughout the world. The focus of its development is creating usable
open-source tools for software developers and system administrators, while providing a user-friendly
desktop and feature-rich server environment.
Partition
A section of the hard disk isolated for a specific purpose. Each partition can behave like a separate disk
drive .
Physical Device
A piece of hardware that is attached to your computer by screws or wires. A hard disk drive is a physical
device. It is also referred to as a physical drive.
RAID
RAID ("Redundant Array of Inexpensive Disks" or "Redundant Array of Independent Disks") is a data
storage virtualization technology that combines multiple physical disk drive components into one or more
logical units for the purposes of data redundancy, performance improvement, or both. Data is distributed
across the drives in one of several ways, referred to as RAID levels, depending on the required level of
redundancy and performance. The different schemes, or data distribution layouts, are named by the
word "RAID" followed by a number, for example RAID 0 or RAID 1. Each scheme, or RAID level, provides a
different balance among the key goals: reliability, availability, performance, and capacity. RAID levels greater
than RAID 0 provide protection against unrecoverable sector read errors, as well as against failures of whole
physical drives.
RAID 0
RAID 0 consists of striping, but no mirroring or parity. Compared to a spanned volume, the capacity
of a RAID 0 volume is the same; it is the sum of the capacities of the drives in the set. But because
striping distributes the contents of each file among all drives in the set, the failure of any drive
causes the entire RAID 0 volume and all files to be lost. In comparison, a spanned volume preserves
the files on the unfailing drives. The benefit of RAID 0 is that the throughput of read and write
operations to any file is multiplied by the number of drives because, unlike spanned volumes, reads
and writes are done concurrently. The cost is increased vulnerability to drive failures—since any drive
in a RAID 0 setup failing causes the entire volume to be lost, the average failure rate of the volume
rises with the number of attached drives.
RAID 1
RAID 1 consists of data mirroring, without parity or striping. Data is written identically to two or more
drives, thereby producing a "mirrored set" of drives. Thus, any read request can be serviced by any
drive in the set. If a request is broadcast to every drive in the set, it can be serviced by the drive that
accesses the data first (depending on its seek time and rotational latency), improving performance.
Sustained read throughput, if the controller or software is optimized for it, approaches the sum of
throughputs of every drive in the set, just as for RAID 0. Actual read throughput of most RAID 1
implementations is slower than the fastest drive. Write throughput is always slower because every
drive must be updated, and the slowest drive limits the write performance. The array continues to
operate as long as at least one drive is functioning.
RAID 2
RAID 2 consists of bit-level striping with dedicated Hamming-code parity. All disk spindle rotation is
synchronized and data is striped such that each sequential bit is on a different drive. Hamming-code
parity is calculated across corresponding bits and stored on at least one parity drive. This level is of
historical significance only; although it was used on some early machines (for example, the Thinking
Machines CM-2), as of 2014 it is not used by any commercially available system.
RAID 3
RAID 3 consists of byte-level striping with dedicated parity. All disk spindle rotation is synchronized
and data is striped such that each sequential byte is on a different drive. Parity is calculated across
corresponding bytes and stored on a dedicated parity drive. Although implementations exist, RAID 3
is not commonly used in practice.
RAID 4
RAID 4 consists of block-level striping with dedicated parity. This level was previously used by
NetApp, but has now been largely replaced by a proprietary implementation of RAID 4 with two
parity disks, called RAID-DP. The main advantage of RAID 4 over RAID 2 and 3 is I/O parallelism: in
RAID 2 and 3, a single read I/O operation requires reading the whole group of data drives, while in
RAID 4 one I/O read operation does not have to spread across all data drives. As a result, more I/O
operations can be executed in parallel, improving the performance of small transfers.
RAID 5
RAID 5 consists of block-level striping with distributed parity. Unlike RAID 4, parity information is
distributed among the drives, requiring all drives but one to be present to operate. Upon failure of a
single drive, subsequent reads can be calculated from the distributed parity such that no data is lost.
RAID 5 requires at least three disks. Like all single-parity concepts, large RAID 5 implementations are
susceptible to system failures because of trends regarding array rebuild time and the chance of drive
failure during rebuild. Rebuilding an array requires reading all data from all disks, opening a chance
for a second drive failure and the loss of the entire array.
RAID 6
RAID 6 consists of block-level striping with double distributed parity. Double parity provides fault
tolerance up to two failed drives. This makes larger RAID groups more practical, especially for high-
availability systems, as large-capacity drives take longer to restore. RAID 6 requires a minimum of
four disks. As with RAID 5, a single drive failure results in reduced performance of the entire array
until the failed drive has been replaced. With a RAID 6 array, using drives from multiple sources and
manufacturers, it is possible to mitigate most of the problems associated with RAID 5. The larger
the drive capacities and the larger the array size, the more important it becomes to choose RAID 6
instead of RAID 5. RAID 10 (see Nested RAID levels) also minimizes these problems
PXE
Preboot EXecution Environment. In computing the Preboot Execution Environment specification describes
a standardized client-server environment that boots a software assembly, retrieved from a network, on PXE-
enabled clients. On the client side it requires only a PXE-capable network interface controller, and uses a
small set of industry-standard network protocols such as DHCP and TFTP.
RAS
Remote Access Service. Is any combination of hardware and software to enable the remote access tools
or information that typically reside on a network of IT devices. A remote access service connects a client to
a host computer, known as a remote access server. The most common approach to this service is remote
control of a computer by using another device which needs internet or any other network connection.
Registry Hive
Highest level of organization in the Windows registry. It is a logical group of keys, subkeys, and values in the
registry that has a set of supporting files loaded into memory when Windows is started or an user logs in.
Root Records
Used in FAT file system. A table that contains the records of every other file and directory in a FAT-
formatted hard disk drive. The operating system needs this information to access the files. There are FAT32,
FAT16 and FAT versions.
SAM
Security Account Manager. Database file that stores users' passwords in a hashed format. Since a hash
function is one-way, this provides some measure of security for the storage of the passwords. It can be used
to authenticate local and remote users. Beginning with Windows 2000 SP4, Active Directory authenticates
remote users.
Sector
The smallest unit that can be accessed on a disk. Typically sector size is 512 or 4096 bytes.
SCSI
Small Computer System Interface. A set of standards for physically connecting and transferring data
between computers and peripheral devices. The SCSI standards define commands, protocols, electrical,
optical and logical interfaces. SCSI is most commonly used for hard disk drives and tape drives, but it
can connect a wide range of other devices, including scanners and CD drives, although not all controllers
can handle all devices. The SCSI standard defines command sets for specific peripheral device types; the
presence of "unknown" as one of these types means that in theory it can be used as an interface to almost
any device, but the standard is highly pragmatic and addressed toward commercial requirements.
Signature Files
File types are recognized by specific patterns that may serve as a reference for file recovery. When a file
header is damaged, the type of file may be determined by examining patterns in the damaged file and
comparing these patterns to known file type templates.
Span Array
A series of dynamic drives linked together to make one contiguous spanned volume.
S.M.A.R.T.
S.M.A.R.T. (Self-Monitoring, Analysis and Reporting Technology; often written as SMART) is a monitoring
system included in computer hard disk drives (HDDs), solid-state drives (SSDs) and embedded
MultiMediaCards (eMMC) drives. Its primary function is to detect and report various indicators of drive
reliability with the intent of anticipating imminent hardware failures. When SMART data indicates a possible
imminent drive failure, software running on the host system may notify the user so preventative action can
be taken to prevent data loss and the failing drive can be replaced and data integrity maintained.
Templates (Patterns)
File types are recognized by specific patterns that may serve as a reference for file recovery. When a file
header is damaged, the type of file may be determined by examining patterns in the damaged file and
comparing these patterns to known file type templates. This same pattern-matching process can be applied
to deleted or damaged partitions. Using FAT or NTFS templates, recovery software can assume that a
particular sector is a FAT or NTFS boot sector because parts of it match a known pattern.
Track
Tracks are concentric circles around the disk and the sectors are segments within each circle.
Unallocated Space
Space on a hard disk where no partition exists. A partition may have been deleted or damaged or a
partition may not have been created.
UEFI
Unified Extensible Firmware Interface is a specification for a software program that connects a computer's
firmware to its operating system (OS). UEFI is expected to eventually replace BIOS. Like BIOS, UEFI is
installed at the time of manufacturing and is the first program that runs when a computer is turned on.
Volume
A fixed amount of storage on a hard disk. A physical device may contain a number of volumes. It is also
possible for a single volume to span to a number of physical devices.
WinPE
WinPE is a compact Windows-based operating system used as a recovery environment to install, deploy,
and repair Windows Desktop Editions, Windows Server, and other Windows operating systems. After boot
to WinPE, user can:
• Set up a hard drive before installing Windows.
• Install Windows by using apps or scripts from a network or a local drive.
Legal Statement
Copyright © 2021, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may
be reproduced in any form or by any means or used to make any derivative work (such as translation,
transformation, or adaptation) without written permission from LSOFT TECHNOLOGIES INC.
LSOFT TECHNOLOGIES INC reserves the right to revise this documentation and to make changes in content
from time to time without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of
such revision or change.
LSOFT TECHNOLOGIES INC provides this documentation without warranty of any kind, either implied
or expressed, including, but not limited to, the implied warranties of merchantability and fitness for a
particular purpose. LSOFT may make improvements or changes in the product(s) and/or the program(s)
described in this documentation at any time.
All technical data and computer software is commercial in nature and developed solely at private expense.
As the User, or Installer/Administrator of this software, you agree not to remove or deface any portion
of any legend provided on any licensed program or documentation contained in, or delivered to you in
conjunction with, this User Guide.
Active@ KillDisk, the Active@ KillDisk logo, KillDisk, KillDisk for Industrial Systems, KillDisk System,
KillDisk Desktop are trademarks of LSOFT TECHNOLOGIES INC.
LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC.
Other brand and product names may be registered trademarks or trademarks of their respective holders.