Securely Erase Data with DriveScrubber: Step-by-Step Tutorial
When you need to remove sensitive files or prepare a drive for disposal, simply deleting files isn’t enough—data can often be recovered. DriveScrubber securely erases data by overwriting it so recovery is highly unlikely. This tutorial walks through preparing, running, and verifying a secure wipe with DriveScrubber on Windows (assumes DriveScrubber is installed).
Before you start — important checks
- Backup: Copy any files you want to keep to another drive or cloud storage. Wipes are irreversible.
- Power/connection: For laptops, connect power. For external drives, ensure a stable USB connection.
- Target selection: Decide whether you’ll erase free space, individual files/folders, or an entire drive/partition.
- Wipe standard: Choose a method (e.g., single-pass zero, DoD 5220.22-M, 3-pass, 7-pass). More passes increase security but take longer.
Step 1 — Launch DriveScrubber
- Open DriveScrubber from the Start menu or desktop shortcut.
- If prompted, allow administrator permissions.
Step 2 — Choose the operation mode
- Secure Delete File(s): Use this to remove specific files or folders permanently.
- Wipe Free Space: Use this when you deleted files normally and want to prevent recovery from slack space.
- Wipe Entire Drive/Partition: Use this to prepare a drive for disposal or reuse.
Select the mode matching your goal.
Step 3 — Select target(s)
- For files/folders: click Add, browse, and select each item.
- For free space: pick the drive letter to wipe free/unallocated space.
- For full drive: select the drive/partition. If the system drive is selected, DriveScrubber may prompt to create a bootable wipe or schedule on next reboot.
Step 4 — Pick a wipe method
- Single-pass zero (fast): Overwrites data with zeros — adequate for casual use.
- Random-pass (recommended for most): Overwrites with random data — good balance of speed and security.
- DoD 3-pass or 7-pass (high security): Multiple patterned overwrites — use for highly sensitive data.
Choose based on sensitivity and time available.
Step 5 — Configure options
- Verification: Enable verification if available (DriveScrubber reads back overwritten areas to confirm). This increases time but adds assurance.
- Logging: Enable logs to record which targets were wiped and when.
- Schedule: For system-drive wipes, you may schedule on reboot if required.
Step 6 — Start the wipe
- Confirm you understand the operation is irreversible (DriveScrubber will show a warning).
- Click Start (or Wipe).
- Monitor progress—DriveScrubber shows estimated time remaining and pass count.
Tips:
- Do not disconnect external drives during a wipe.
- Expect multi-hour runs for large drives and multi-pass methods.
Step 7 — Verify completion
- Review the final status screen or log for success/fail indicators.
- If verification was enabled, check that DriveScrubber reports verification passed.
Step 8 — Optional: Validate with a recovery tool
For extra assurance, after a wipe you can run a reputable file-recovery tool (e.g., Recuva, PhotoRec) against the wiped target to confirm no recoverable files remain.
Troubleshooting
- If DriveScrubber aborts: check for drive errors, faulty cables, or insufficient permissions.
- If verification fails: rerun with a stronger wipe method (additional passes).
- If wiping system drive: follow DriveScrubber’s bootable-media instructions to avoid OS interference.
Final recommendations
- For disposal or transfer of drives: use a multi-pass method or physical destruction for highest assurance.
- For routine privacy: wiping free space with a random-pass method is usually sufficient.
- Keep logs and note the wipe method used if you need to prove a drive was securely erased.
If you want, I can provide a one-page checklist you can print and follow during wipes.
Leave a Reply