This website uses cookies to ensure you get the best experience on our website. By continuing to browse the site, you agree to our use of cookies.

More info ››
Contact sales: 1-888-DISK-IMAGE

1-888-DISK-IMAGE (1-888-347-5462)

Sales North America

+49-761-59018-202

Sales Europe

+81(3)3265-1278

Sales Japan

+7 (495) 789-6717

Sales Russia

Contact sales: 1-888-DISK-IMAGE

1-888-DISK-IMAGE (1-888-347-5462)

Sales North America

+49-761-59018-202

Sales Europe

+81(3)3265-1278

Sales Japan

+7 (495) 789-6717

Sales Russia

Paragon

Disk Wiper 12 Special Edition for XP

Irreversibly destroy all on-disk data easily and quickly
  • Free of charge, powerful and extremely easy to use
  • Prevent your sensitive data from falling into the wrong hands
  • Ten different disk sanitization methods
  • Wipe exactly what you need - hard disks, separate partitions or free space
  • Support of Windows XP
Legacy Product
Unavailable since 06 Jun 2018

Wipe your hard drives before rejecting your old Windows XP system in order to keep your private affairs private. Simply erasing or reformatting your hard disk drive may not be enough to prevent your sensitive data from falling into the wrong hands. Disk Wiper 12 Special Edition for XP provides skilled resources and comprehensive wiping tools to safeguard your personal identity and sensitive information! Irreversibly destroy all on-disk data easily and quickly, so it cannot be recovered with any present-day technology. Click here to learn more about data sanitization ››

Key Features and Benefits

Features

Benefits

Features

Support for Windows XP

Accomplish any operation under Windows XP.

Comprehensive wiping

Wipe exactly what you need – hard disks/separate partitions (primary, extended, logical).

Ten different disk sanitization methods support

Irreversibly destroy all on-disk data in compliance with major national government and military data erasure standards, as well as the most comprehensive academic wipe algorithms, thus providing maximum level of security (US DoD 5220.22-M, US Navy standards NAVSO P-5239-26, British HMG Infosec Standard No.5, German VSItR Standard, Peter Gutmann’s algorithm, Bruce Schneier’s algorithm, etc.)

Powerful Paragon`s algorithm

Irreversibly destroy all on-disk data providing maximum level of security.

Extreme customization option

Create your own wipe algorithm with minimal effort – define up to 4 wiping patterns, number of passes for each wiping pattern and for the group of patterns, thus resulting in over 40000 possible number of passes.

Efficient operation

Minimal effect on the system performance.

Simple Wizard-driven engine

Carry out the needed operations, minimizing manual labor and time costs.

User friendly interface

Enjoy an easy to manage and understand Windows style.

Basic partitioning operations (create, delete, format)

Optimize the management of your hard disks.

Wipe report with extended hardware and system information

Be well-informed about the results of the wipe operation to verify when wipe operations have been successfully accomplished.

Logging of bad blocks (corrupted sectors)

Be informed that these sectors may still contain classified information.

Support for the latest HDD standards

Enjoy support for AFD (Advanced Format Drive), 2TB+ and non-512B sector size drives.

Any hard disk or flash memory drive support

Support of large IDE, SCSI, SATA and GPT/UEFI-formatted hard disks, USB 1.0, USB 2.0, USB 3.0 flash memory drives.

Comprehensive file system support

Support of FAT16/32, NTFS, Ext2/3/4, Apple HFS+ and other file systems.

Windows Blue Screen Module support

Reboot into a special simplified mode to process locked partitions (e.g. clear free space of the system partition).

WinPE based Wiping Media

Enjoy support of a wider range of hardware configurations with the option to add drivers for specific hardware on-the-fly. Click here to learn more about Paragon Recovery Media Builder ››

System Requirements

  • CPU: Intel Pentium CPU or its equivalent, with 300 MHz (1000MHz for Windows PE Recovery CD) or higher processor clock speed
  • RAM: 256 MB required (at least 1 GB of RAM for WinPE bootable environment)*
  • Disk space: 125 MB*
  • Internet Explorer 5.0 or higher
  • Mouse
  • SVGA video adapter and monitor
  • Extra: CD/DVD/BD Drive

Supported HDD Interfaces

  • Parallel ATA (IDE)
  • Serial ATA (SATA)
  • External SATA (eSATA) HDD
  • SCSI
  • iSCSI
  • Solid State Drive (SSD)
  • Advanced Format Drive (AFD)
  • 2TB+ Drives
  • Non-512B Sector Size Drives
  • All levels of SCSI, IDE and SATA RAID controllers
  • Full support of RAIDed configurations (hardware RAIDs)
  • IEEE 1394 (FireWire)
  • USB 1.0/2.0/3.0
  • Support of MBR- and GPT-formatted Drives
  • PC card storage devices
  • Supported CD/DVD and other Removable Media Formats

  • CD-R
  • CD-RW
  • DVD-R
  • DVD-RW
  • DVD+R
  • DVD+RW
  • DVD+/-R (DL)
  • BD-R
  • BD-RE
  • Support for ZIP®, Jazz® and other removable media
  • Supported File Systems**

  • NTFS (v1.2, v3.0, v3.1)
  • FAT16
  • FAT32
  • Linux Ext2FS
  • Linux Ext3FS
  • Linux Ext4FS
  • Linux Swap
  • Apple HFS+
  • Other file systems (in sector-by-sector mode)
  • Supported Operating Systems

  • Windows XP Home Edition SP2 (32-bit)
  • Windows XP Professional SP2/SP3 (32-bit)
  • For disk wiping under server operating systems please check our Paragon Hard Disk Manager Business ››
  • *During the installation additional free space (up to 1GB) will be required.
    **Encrypted volumes are not supported.

    • Express Launcher
      Express Launcher
    • Express Launcher for WinPE Recovery Environment
      Express Launcher for WinPE Recovery Environment
    • Full Scale Launcher
      Full Scale Launcher
    • Full Scale Launcher for WinPE Recovery Environment
      Full Scale Launcher for WinPE Recovery Environment

    Data Sanitization

    Data security nowadays is the burning issue not only for companies and government agencies, but rank and file people as well. In the world of high tech, it is quite a challenge to destroy information, especially when you have no idea how to do it. We are all well aware of recent notorious trials, when the only evidence determining the outcome of the process was the data resurrected from a magnetic device. According to various studies over 40% of all discarded magnetic storage devices do still contain personal and classified info that as you can already guess, can be and is used not in the owner’s favor. Besides, constant hardware upgrade makes the problem even more complicated than ever.

    Actually data security is a two-sided problem. It is to be made clear, that providing confidentiality implies not only information to be stored properly, but also be destroyed according to certain rules. The first step to protecting yourself is to know exactly which security precautions work and which do not.

    Many people believe the misconception that repartitioning a disk will result in complete destruction of its contents. Actually that is not quite so. Repartitioning the drive only alters references to partitions in the Partition Table, leaving all file data intact. In fact, there are a number of programs available to successfully recover previously deleted partitions.

    Formatting a drive also does not guarantee data destruction. Formatting procedure implies modification of the Master File Table (MFT) that keeps track of where file contents are stored on the disk and verification of each sector for consistency. Even a low-level format does not actually erase the file contents for good, since they can still be resurrected from their deleted state with minimal effort by using the popular today Magnetic Force Microscopy technology. MFM is an effective tool to magnetic investigations on submicron scale. Image obtained by MFM is the space distribution of some parameter characterizing magnetic probe-sample interaction, i.e. interaction force, amplitude of vibrating magnetic probe, etc. The MFM technology is being successfully applied in resurrecting deleted information even after a multiple overwriting, since it provides a unique possibility to differentiate between ones and zeros of various passes, because they are far from being the same when looking through the Magnetic Microscope.

    The only way to make sure that all the data has been erased from a magnetic device is to overwrite all on-disk sectors with random patterns. Although this sounds complex, there is an easy way to do this.

    The process of deliberately, irreversibly removing or destroying the data stored on a memory device (magnetic disks, flash memory drives, etc.) is generally known as Data Sanitization. A device that has been sanitized has no usable residual data and even advanced forensic tools should not ever be able to recover it, thus providing maximum level of security.

    Data Security Standards

    Government and military agencies are deeply worried by the fact how easily deleted information can be recovered particularly taking into consideration classified and top secret issues. That is why there have been developed a number of disk sanitizing standards. They are distinguished by wiping patterns and number of passes:

     

    1. US DoD 5220.22-M. US Department of Defense recommends to overwrite all addressable locations with a character, its complement and then a random character. Finally, the target data area is to be verified;
    2. US Navy standards NAVSO P-5239-26.
      • NAVSO P-5239-26 for MFM encoded drives;
      • NAVSO P-5239-26 for RLL encoded drives;
    1. British HMG Infosec Standard No.5. At first to write a single character pattern, then its complement and then a random character. Finally, the target data area is to be verified;
    2. German VSItR Standard. Overwrite the deleted information 7 times with specific patterns. Finally, the target data area is to be verified;
    3. Australian ASCI 33. Overwrite with a character (C), then verify. Overwrite with –C (the first pass character’s inverse), then verify again. Overwrite everything with both C and –C once again but without verification. Fill everything with random characters.
    4. Russian GOST R 50739-95. Destroy information by a single pass with writing random characters into each sector byte.
    5. Peter Gutmann’s algorithm. A whopping 35 passes, with 27 random-order passes using specific patterns combined with eight passes using random patterns;
    6. Bruce Schneier’s algorithm. Two passes of specific patterns followed by five passes using a cryptographically secure pseudo-random sequence;
    7. Paragon’s algorithm.
      • Overwrite each sector with a forcefully randomized 512-byte string, new for each sector, using CSPRNG (cryptographically secure pseudo-random number generator).
      • Overwrite each erased sector with its complement.
      • Overwrite each sector with a 512-byte string (CSPRNG), again forcefully randomized and different from the first pass, and new for each sector.
      • Finally, the target data area is to be verified.

    Note! Military and government standards always require 100 percent residual data verification. It is necessary to make sure that the operation has been properly accomplished. Besides corrupted sectors discovered during the operation are to be logged to keep the user informed, since these sectors may contain classified information.

    Resources

    Current Version

    Download Paragon Disk Wiper 12 Special Edition for XP

    Product Documentation

    Download Paragon Disk Wiper 12 Special Edition for XP User Manual

    Spelling error report

    The following text will be sent to our editors: