       
www.titlebar.net

jharper124@titlebar.net






SECURE DELETIONS

Version 2

Vista Version



Readme:






http://www.titlebar.net

Go to the web site to get the latest version of Secure Deletions whenever you want.


The "Secure Deletions" program does the following:
-encrypts and overwrites files
-encrypts and overwrite folders
-overwrites the unused space on disks/drives.
-creates an encrypted folder named "Secure Deletions" under the user's profile and creates a Right-click/context menu item which the user may use to move files and folders to the Secure Deletions folder under their profile. This Secure Deletions folder can be encrypted again and overwritten at the users convenience using the Secure Deletions program
--------



Installation:

Supported Operating Systems: This version of was developed specifically for the "Vista" Operating system. Microsoft .NET Framework is included with, and part of, Microsoft's Vista operating system. There is another version for other Windows operating systems. 


Run the Secure Deletions setup file and a "Secure Deletions" shortcut group will be created in your Start Menu's Programs list. Locate the Secure Deletions shortcut in this shortcut group. This shortcut can be copied and pasted anywhere you would like. The setup procedure is straight forward so installation will probably only take you a moment or two.

The Secure Deletions program is installed in the Program Files directory located under the user's profile.


Once the program has been run, if you want, you can move the "Secure Deletions" shortcut group, located in the Start Menu's Programs list, to a more secure location of your choosing. If you think your situational factors require it, you may want to encrypt, or otherwise protect, the Secure Deletions program "Readme". Titlebar Software does have a freeware file encryption utility available at...  www.titlebar.net. 






USING THE "SECURE DELETIONS" PROGRAM:

This Secure Deletions tool provides the user with convenience and security. The encryption and overwrite procedures used during the secure delete process will result in your securely deleted files being impossible to run, see, or locate. The files will simply not exist. 

Start the program and you will see "Select a file, a folder, or a disk/drive." in a textbox. Click the button to the right of the textbox and a file and folder browser will appear. Use the browser to select a file or folder. Once you have selected a file or folder, click the "Secure Delete" button and the selected file or folder will be encrypted and overwritten. All the contents of a selected folder are encrypted and overwritten. The selected items are encrypted, and re-encrypted, several times over and are overwritten several times.

Two methods of encryption are used in the overwrite procedure. The encryption that is part of the Windows operating system is used and a form of encryption known as "AES (Rijndael) secret key encryption" is also used. The "secret key" is a string of characters such as "I=04Rip:}1k>td=!@4gu9N8DW;>%}zebu" that is created and used in the encryption procedure. Titlebar software changes the secret key characters once a month. Old keys are destroyed, so, it is ultimately impossible for files that have been encrypted, using the older keys, to be decrypted.

A third method used in the overwrite procedure overwrites data with a string of numbers such as 22222222 or 44444444. There is no encryption involved- your data is simply overwritten with numbers. As a result of there being no encryption involved in this step, there is absolutely no chance of decryption... the data is simply overwritten with a string of numbers and thereby destroyed.

A progress bar will be visible while you are securely deleting folders. The progress of the first series of encryptions and overwrites are shown using this progress bar. A second progress bar will appear on the Secure Deletions' program window if a large file or folder is being securely deleted. The second progress bar often is not visible when smaller files or folders are securely deleted because this stage of the overwrite procedure will occur in a manner of milliseconds. This second progress bar will show the progress of the encryption procedure which involves Rijndael encryption and overwrite.

For smaller files and folders the user has the option of viewing the items that have been overwritten and/or the items used to overwrite the original file or folder. Before the secure delete procedure has completed the user will be asked if they want to inspect the files and folders before the final deletion takes place. If you want to inspect the items select "Yes". If the user clicks on "Yes" a message box will appear giving the instructions on how to go about inspecting the file or folder. The final deletion of the items will not take place till the "OK" button, located in the message box, is clicked.
   
Once the secure delete procedure has completed the user is asked if they have other file system objects they want removed. If the response is "Yes" the Secure Deletions program will refresh/restart and continue. If the response is "No" the Secure Deletions program will close.

If a disk is selected using the file and folder browser the user will be asked if they want to overwrite the unused space on the drive. If the response is "Yes", a message box will appear giving the user a short description of the overwrite procedure and a "DOS window" appears. In the DOS window the user can see the overwrite procedure as it takes place. The overwrite procedure is done using the "cipher.exe" which is part of the Windows operating system. The cipher.exe is a Microsoft application which any user may use if they learn the DOS commands. It is included in the Windows operating system.





Here is an excerpt from a Microsoft Knowledge Base article-

"When you delete files or folders, the data is not initially removed from the hard disk. Instead, the space on the disk that was occupied by the deleted data is "deallocated." After it is deallocated, the space is available for use when new data is written to the disk. Until the space is overwritten, it is possible to recover the deleted data by using a low-level disk editor or data-recovery software."

"If you create files in plain text and then encrypt them, Encrypting File System (EFS) makes a backup copy of the file so that, if an error occurs during the encryption process, the data is not lost. After the encryption is complete, the backup copy is deleted. As with other deleted files, the data is not completely removed until it has been overwritten. The new version of the Cipher utility is designed to prevent unauthorized recovery of such data."

(To learn more, do an internet search for the "cipher.exe".)



During the disk overwrite there will be three passes made over the unused portion of your disk. The first pass will overwrite the drive with a string of '0x00' data clusters. The next pass will overwrite your drive with a string of '0xFF' data clusters. And the last pass will overwrite your drive with random numbers. You can continue to use your computer but it would be best to close any running applications that you are able to and let you computer sit idle while the overwrite process completes. It will most likely take about 15 or 20 minutes. This procedure should not be stopped once it has been started.

You will likely want to go get a cup of coffee or a soft drink while the overwrite procedure takes place.





"Overwrite Deleted Files" Button:

Select a drive and click the "Overwrite" Deleted Files" button and a procedure of programably finding all file extensions that are used on your computer and deleting a very large number of files using these file extensions, with names such as "01000011" and file contents that consist of a string of numbers such as '33333333", in an effort to overwrite files you have previously deleted using the Window's Recycle Bin. A very large number of folders, with names such as "10000011" are also programably deleted. This process is not infallible and does take a considerable amount of time- usually between 15 and 45 minutes. To avoid having to use this procedure very often, use the "Secure Deletions" item in your right-click/Context Menu to delete items to the Secure Deletions folder, located under your profile, and use the Secure Deletions program to overwrite the Secure Deletions folder.

In essence, use the Secure Deletions folder as a Recycle Bin replacement and you will not have to be concerned that files you have deleted may still be on your hard drive. When you overwrite the Secure Deletions folder the contents of the folder are destroyed. However, when you empty your Windows Recycle Bin, the items located in the Recycle Bin are only "deallocated". The term "deallocate", in regard to items removed using the Windows Recycle Bin, means about the same thing as "stored with no reference" or "unreferenced storage". As opposed to an item actually being removed from the hard drive, any reference to the item is removed from the operating system. 

Defragmenting a drive is also very likely to overwrite deleted files that remain on a drive. 

(There is a freeware program named "FreeUndelete", by a software publisher named "Recoveronics", you can download and use to search your hard drive for items that you have previously deleted. It will find the items that still remain on your hard drive. A registered full version of this undelete software is available for a reasonable price.)
 





FileCabinets:
     
"FileCabinets" is a feature for hiding/protecting your personal folders and their contents. Use a test folder to experiment with and test the "Lock" and "Unlock buttons. Your test folder can be locked in a FileCabinet using the Lock button. Your folder, and its contents, will truly be inside the "cabinet" folder. Use Unlock to make the test folder visible once again.

You will be asked to name the folder being made visible whenever you lock, or unlock, a folder.

Right-click on the Cabinet folder containing several test items locked in the Cabinet then select properties to look at the "Size". The size of the Cabinet folder will confirm that the Cabinet contains your personal folder, and its contents.






Using "Secure Deletions" in the "Right-click/Context Menu":

In the Secure Deletions program "Options", there is a check-box where the use can elect to use a "Secure Deletions" item in the right-click/context menu. If this box is checked, a "Secure Deletions" item will be placed in the context menu. Right-click any folder or file and click on "Secure Deletions" in the context menu that appears and the selected item will be moved to the "Secure Deletions" folder. The first time this option is used, the "Secure Deletions" folder will be created. If the folder is moved or delete, it will be recreated.

The user's "Secure deletions" folder is located under their profile. The Secure Deletions folder can be used as a replacement for the "Recycle Bin".



RECYCLE BIN'S GLOBAL SETTINGS:
If you find yourself using the Secure Deletions feature more-and-more you may want to take a look at the Global setting of the "Recycle Bin". To access the Recycle Bins properties, right-click on the Recycle Bin and select Properties in the right-cl8ick Context Menu that appears. You might want to consider setting the percent of each drive used by the Recycle Bin down between 1 and 3 percent. 1 Percent is suggested and then simply do not use the Recycle Bin very much. 




IMPORTANT NOTE: THE SECURE DELETIONS FOLDER THAT APPEARS TO BE A RECYCLE BIN IS NOT THE ACTUAL SECURE DELETIONS FOLDER. THE ACTUAL SECURE DELETIONS FOLDER IS LOCATED BEHIND THAT RECYCLE BIN. IF YOU PLACE ITEMS IN THAT RECYCLE BIN, INTENDING FOR THE ITEMS TO BE SECURELY REMOVED, THE ITEMS WILL NOT BE SECURELY DELETED AND WILL REMAIN VISIBLE IN THE RECYCLE BIN. YOU MUST USE THE SECURE DELETIONS PROGRAM, NOT THE RECYCLE BIN, TO SECURELY REMOVE FILE SYSTEM ITEMS.


AGAIN, YOU MUST USE THE SECURE DELETIONS PROGRAM, NOT THE "SECURE DELETIONS" FOLDER THAT APPEARS TO BE A RECYCLE BIN, TO SECURELY REMOVE FILE SYSTEM ITEMS.   


 


Start the Secure Deletions program and click the "Overwrite The Secure Deletions Folder" button to encrypt and overwrite the Secure Deletions folder. The Secure Deletions folder may be encrypted and overwritten at the users convenience. However, it is recommended that the Secure Deletions folder size not be allowed to exceed 4 or 5 megabytes. The procedure for encrypting and overwriting the Secure Deletions folder has been tested successfully with Secure Deletion folders of over 100 megabytes in size. However, a system error is likely to occur when encrypting and overwriting a very large Secure Deletions folder. Any folder larger than 4 or 5 MB is considered to be a very large folder for our purposes. This error is caused by the fact that the overwrite files, resulting from overwriting a very large folder or file, will consequently also be very large. The error will correct itself. However, if you are using an older computer that does not have a whole lot of system resources do not be surprised if you get a system error if you try to secure delete folders in excess of 20 or 25 megabytes. A good rule of thumb- it would be best to keep the size of the Secure Deletions folder below 5 MB.


In essence, try to keep the size of the folders you secure delete below about 10 MB. But you can secure delete larger folder in a pinch.

When the overwrite files are smaller than 25 KB you will be given the opportunity to inspect the file used to overwrite a folder. After the encryption and overwrite stages have completed you will receive a prompt in the form of a message box. This prompt will ask you if you want to inspect you folder before the final deletion. If you click "Yes", you will receive instructions on how to inspect the overwriting and encryption items. The final deletion will not take place till you click "OK" in the message box that contains these instructions. This option is bypassed when larger folders are overwritten because the resulting large overwritten files will likely cause a system error. If you do want to get an idea of how this procedure works make a few trial runs and securely delete a few small folders that you do not need.

In order to witness the overwriting of larger files, send them to your Secure Deletions folder using the right-click/context menu's "Secure Deletions" item. Then open the "Options" and place a check mark in the "Check the encryption and overwrite process." option. Then use the secure Deletion program to overwrite the Secure Deletions folder. Throughout the overwriting and renaming procedure you will me able to check the process at various checkpoints. There will be message boxes at these checkpoints to inform the user that the can check the overwrite procedure.

When the Secure Deletions folder is being encrypted and overwritten the Secure Deletions folder, and all its contents, must be closed. If these items are not closed an error will most likely occur. However, these errors will correct themselves. The error is cause by the Window's operating system trying to find folders or files that are no longer there. The folders and files have been overwritten by programably "forcing" these folders and files to be replaced with encrypted copies of the folders and files. Once this encryption has taken place the folders and files are programably "forced" deleted.

(Note: you can "Cut" items out of your regular Recycle Bin and "Paste" them in the Secure Deletions folder.)

To retrieve an item from the Secure Deletions folder, run the Secure Deletions program and click on the "Open the 'Secure Deletions' Folder" button, locate the item you want to restore, and "cut" and "paste" the item to a location of your choosing. You will likely need to look in the subfolders having numerical names to locate the item you want to restore. If you have a problem locating an item you can use the Windows "Search" tool, while you have the Secure Deletions folder open, to help you find the items. You can "Browse" to the Secure Deletions folder using the Windows Search tool and search only the Secure Deletions folder so you do not have to wait while your whole hard drive is being searched.

(Note, once the program has been run, if you want, you can move the "Secure Deletions" shortcut group, located in the Start Menu's Programs list, to a more secure location of your choosing. If you think your situational factors require it, you may want to encrypt, or otherwise protect, the Secure Deletions program "Readme". Titlebar Software does have a freeware file encryption utility available at...  www.titlebar.net.) 

 



Options:

Click on "Options" in the Menu Bar and the options window will appear. To the right of each option is an "Information Button". Click on the Information button for a particular item/option if you need information on the item.


Secure Deletions and the Windows Briefcase:

The Secure Deletions right-click/Context Menu entry will NOT remove folders from a Windows Briefcase folder. It will remove files from a Windows Briefcase, but, not folders. And, files can only be removed one at a time from a Windows Briefcase using the right-click/context Menu's Secure Deletions entry. If you select more than 1 file and try to send them to the Secure Deletions folder the files will not be moved and the Briefcase will most likely try to synchronize the files, rather than move them, when you try to move the files. The Windows Briefcase is used by some users to synchronize items located in their Briefcase with original, or parent, files. Secure Deletions was not programmed to override the Windows Briefcase synchronization feature for security reasons.

Most Users do not use the Windows Briefcase synchronization feature because this method of synchronizing files is fairly obsolete. However, if you do use the windows Briefcase for its synchronization properties, keep the items you will be synchronizing in a folder. If the files are important enough to you that you want them synchronized with an original, or parent, file you certainly do not want to have them securely deleted as a result of a slip-up. If you do want to securely delete such an item, securely delete it manually using the Secure Deletions program or "cut" and "paste" the item to another location other than the Briefcase and then move the item to the Secure Deletions folder using the right-click/Context Menu's Secure Deletions entry.

This might be recognized as being a bug by some users who have not read this information. However, it would be a rather simple matter to programably change the Windows Briefcase folder properties so the items in the Briefcase could be moved and then change the folder back to a Windows Briefcase once the items were moved. This would take place in a matter of milliseconds and would typically not be visible to the naked eye. But such a procedure would result in a security risk for the people who do use the Briefcase for synchronization.




Uninstall:
During the uninstall process the Secure Deletions folder will be overwritten. However, it would be best to start the Secure Deletions program, just before uninstalling it, and click the "Overwrite the Secure Deletions Folder" button to encrypt and overwrite the Secure Deletions folder. This will create a new Secure Deletions folder. The newly created Secure Deletions folder will thereby be empty. Next, go to "Programs and Features" in the Control Panel and locate the "Secure Deletions" program on the list. Click on it to highlight it and click "Uninstall". All files, folders, and registry entries are removed by the uninstall procedure.







