Browse Definitions :
Definition

file shredder

Contributor(s): Matthew Haughn

A file shredder, also known as a virtual or digital shredder, is a program designed to render computer-based files unreadable, just as a conventional shredder makes physical documents unreadable.

In most operating systems, when a user deletes a file, it still exists on the hard drive but is made inaccessible through normal means. What’s actually deleted is the operating system’s pointer to the file, so it’s invisible to the user but still exists in storage. The storage space for the file is considered available and that may cause the data to be overwritten, although it is not possible to know that it has been.

It may be possible to recover the original data unless overwriting has taken place hundreds of times. Deleted files can be recovered through readily available freeware programs such as Recuva and Puran File Recovery as well as professional software such as EnCase that data recovery and law enforcement officials use.

File shredders are similar to hard drive overwriters except that they work with individual files, rather than effectively obliterating the entire drive. The programs overwrite the content in a file multiple times with zeroes, ones and random bits to ensure that the data is unrecoverable other than through extraordinary efforts.

If it’s crucial that data is obliterated, the only way to be sure it can’t be accessed is to physically destroy the device. The most effective way to ensure complete data destruction is to pulverize the assembly, in much the same way as a wood chipper disposes of tree limbs and brush. At a minimum, hard drive shredding involves severing every track on every platter in a drive. Hard drive shredding products and services exist for this purpose.

In the enterprise, ensuring that the sensitive information in deleted files cannot be recovered is essential to information security, compliance and data governance.  

This was last updated in September 2015

Continue Reading About file shredder

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

-ADS BY GOOGLE

File Extensions and File Formats

Powered by:

SearchCompliance

  • compliance audit

    A compliance audit is a comprehensive review of an organization's adherence to regulatory guidelines.

  • regulatory compliance

    Regulatory compliance is an organization's adherence to laws, regulations, guidelines and specifications relevant to its business...

  • Whistleblower Protection Act

    The Whistleblower Protection Act of 1989 is a law that protects federal government employees in the United States from ...

SearchSecurity

  • payload (computing)

    In computing, a payload is the carrying capacity of a packet or other transmission data unit. The term has its roots in the ...

  • passphrase

    A passphrase is a string of characters longer than the usual password (which is typically from four to 16 characters long) that ...

  • Web application firewall (WAF)

    A Web application firewall (WAF) is a firewall that monitors, filters or blocks traffic to and from a Web application. WAFs are ...

SearchHealthIT

SearchDisasterRecovery

SearchStorage

  • computational storage

    Computational storage is defined as an architecture that couples compute with storage in order to reduce data movement. In doing ...

  • data deduplication

    Data deduplication -- often called intelligent compression or single-instance storage -- is a process that eliminates redundant ...

  • public cloud storage

    Public cloud storage, also called storage-as-a-service or online storage is a service model that provides data storage on a ...

Close