TuneUp Utilities - 2014 Instrukcja Użytkownika Strona 68

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj
  • Strona
    / 125
  • Spis treści
  • BOOKMARKI
  • Oceniono. / 5. Na podstawie oceny klientów
Przeglądanie stron 67
TuneUp Utilities 201 4 © 20 13 C opyright A V G Tec hnologies C Z, s.r.o. A ll rights res erved. 68
Prior to deletion, the files are overwritten with special data patterns multiple times, destroying the original
contents so effectively that even expensive examinations of the magnetic structure of the disk in a special
laboratory would not allow the data to be recovered.
Secure deletion, Gutmann method
This method, named after its inventor Peter Gutmann, overwrites the files to be deleted 35 times with random
values in a special pattern and then deletes them. This method is considered the most secure way to delete
files with software, but also takes the longest time.
Przeglądanie stron 67
1 2 ... 63 64 65 66 67 68 69 70 71 72 73 ... 124 125

Komentarze do niniejszej Instrukcji

Brak uwag