
:max_bytes(150000):strip_icc()/erasing-equations-on-blackboard-jeffrey-coolidge-stone-getty-images-56a6fad35f9b58b7d0e5d182.jpg)
Instructs GDisk to perform the required wipes meeting the DoD standards. Replace disk with a number between 1 and 128. The Gdisk executable used, such as GDisk.exe (for DOS) or GDisk32.exe (for WinPE). The following table explains the GDisk command-line elements. GDisk can be run from a DOS (GDisk.exe), WinPE (GDisk32.exe or GDisk64.exe), or Linux (Gdisk) pre-boot operating system using the following syntax:
:max_bytes(150000):strip_icc()/securely-file-shredder-5a479b8f842b170037eb8620.png)
All addressable locations on the hard disk are overwritten with 0x35.According to this standard, the following group of operations is performed six times: Department of Defense (DoD) 5220.22-M standard.
:max_bytes(150000):strip_icc()/circuit-board-and-binary-digits-519408970-57bb618e5f9b58cdfd2f83d5.jpg)
GDisk’s secure disk wiping feature wipes data according to the U.S. The GDisk utility (one of the Ghost tools included with Deployment Solution 6.9 SP1 - Ghost Solution Suite 3.0) is a multipurpose disk management utility that includes a secure disk wiping feature. When reallocating hardware from one person to another, it is often important to ensure that none of the old data from the hard disk can be retrieved, even after deploying a new imaging to the computer. How to preform a hard disk wipe using the Ghost utility called GDisk.
