D-Secure - Advanced Data Security Solutions
Resources & BlogsPartnersTrust CertificateSupport
Login
D-Secure - Advanced Data Security Solutions

Leading provider of Compliant data erasure solutions for enterprises worldwide. Secure your data lifecycle with our enterprise-grade security solutions.

Products
  • All Products
  • Drive Eraser
  • Drive Eraser Diagnostic
  • File Eraser
Industries
  • All Industries
  • Healthcare
  • Banking & Finance
  • Government
  • Education
  • Non-Profit
Resources
  • Documentation
  • Compliance
  • Blog
  • Case Studies
Company
  • About Us
  • Contact
  • Partners

© 2026 D-Secure Inc. All rights reserved.

All systems operational
Privacy PolicyLegal PolicyTerms of ServiceCookie PolicySecurityStatus

Table of Contents

About D-Secure File Eraser
About the Guide
Getting Started
Working with D-Secure File Eraser
Frequently Asked Questions (FAQs)
About D-Secure

D-Secure File Eraser

Complete User Guide & Documentation

About D-Secure File Eraser

D-Secure File Eraser is a complete solution to maintain your computer privacy by erasing unwanted information from the computer. Erased data is beyond recovery. D-Secure File Eraser can be used to erase files/folders, Unused space, and System traces.

D-Secure File Eraser erases files & folders completely from the hard drive. You can select multiple files/folders at a time for erasure. Once files/folders from the drive are erased using D-Secure File Eraser data can't be recovered back. The software allows you to generate and save the reports of the completed erasure process.

In addition, it can erase unused space completely such that all the traces of previously stored data are completely removed. When you delete data from a hard drive, the data content is not deleted entirely, instead the space occupied by the data is marked as unused space and the new data is written on that unused space.

D-Secure File Eraser also erases all the system traces. Operating systems store records of all activities such as browsing Internet and opening documents constantly.

D-Secure File Eraser has a set of 20+ different erasure algorithms, that are accepted globally, to ensure permanent data deletion. You can choose any of the algorithms for erasure process. The software is menu driven, simple to use with an intuitive interface, and requires no prior technical skill.

Key Features:

  • Operating System- Compatible with Windows 10/11, macOS 10.15+, and Linux distributions.
  • Erase Files and folders- Option to erase selected files or folders from the hard drive.
  • Erase Free Space- Option to erase the free space to secure privacy from the selected volumes.
  • Setting Schedule Erasure- Supports schedule erasing tasks to run them automatically at specified periods.
  • Generate and Save Reports- Option to generate and save 100% secure and Tamper-proof audit reports with certificate in various formats such as PDF
  • Compliance Reporting- Option to customize and preview reports before saving, ensuring audit readiness.
  • Search Report- Option to search reports by selecting the appropriate date range or erasure type.
  • Save Report to D-Secure Cloud- Automatic report uploaded to D-Secure Cloud Console for centralized compliance management.
  • Supported Erasure Standards and Verification Methods- Provides 20+ different erasing algorithms with 3 verification methods to erase the data permanently.
  • Search and Erase- Option to search specific files using name or extension on the system and erase them using a suitable algorithm.
  • Supports Multiple Themes- Option to switch between light and dark modes.

About the Guide

This user guide contains steps to assist you in various functions of D-Secure File Eraser. Each function is explained in detail, in the corresponding sections. This guide covers the following major topics:

  1. About D-Secure File Eraser
  2. About the Guide
  3. Getting Started
  4. Working with D-Secure File Eraser
  5. Frequently Asked Questions (FAQs)
  6. About D-Secure

This guide has the following features for easy navigation and understanding:

  • Select a topic from the list of topics given on the left of the navigation pane.
  • There are Notes and Tips in some topics of this guide for better understanding and ease of work. These Notes and Tips are given in italic style.

This is a web-based guide and requires an active internet connection. You can read this guide with all popular browsers like Chrome, Firefox, Internet Explorer, and Safari. For better viewing experience, it is recommended to use the Chrome browser.

Getting Started

Installation D-Secure File Eraser

Follow these comprehensive steps to successfully install D-Secure File Eraser on your system:

1. Download the installer from the official D-Secure website: Navigate to the official D-Secure website using your preferred web browser. Locate the Downloads section and select the appropriate installer version compatible with your operating system (Windows, macOS, or Linux). Ensure you download from the official source to avoid any security risks or corrupted files. The installer file will be saved to your default Downloads folder.

2. Run the installer with administrator privileges: Once the download is complete, navigate to your Downloads folder and locate the D-Secure File Eraser installer file. Right-click on the installer executable and select "Run as Administrator" to ensure the installation process has the necessary permissions to install system-level components. This step is crucial for proper software integration with your operating system.

3. Follow the installation wizard and accept the license agreement: The installation wizard will launch, presenting you with a welcome screen. Click "Next" to proceed through the setup process. Carefully read through the End User License Agreement (EULA) to understand the terms and conditions of use. Once reviewed, check the "I accept the agreement" checkbox and click "Next" to continue with the installation.

4. Choose installation directory: The installer will prompt you to select a destination folder where D-Secure File Eraser will be installed. You can either accept the default installation path (typically C:\Program Files\D-Secure File Eraser on Windows) or click "Browse" to choose a custom location on your hard drive. Ensure the selected drive has sufficient free space for the installation, typically requiring at least 100-200 MB of available disk space.

5. Complete the installation: Review your installation settings on the summary screen to ensure all configurations are correct. Click "Install" to begin the actual installation process. The installer will copy all necessary files to your system, register components, and create shortcuts. Once the progress bar reaches 100%, click "Finish" to complete the installation. You may be prompted to restart your computer for all changes to take effect. The application will now be available in your Start Menu or Applications folder, ready to launch and use.

Assign Full Disk Access

To completely allow the software to scan and erase your data, you are required to Assign Full Disk Access.

Steps to Assign Full Disk Access for MacOS:

Applicable for Macs having MacOS 15 Sequoia, MacOS 14 Sonoma and MacOS 13 Ventura.

1. Click Open Full Disk Access button.

2. Full Disk Access window is displayed.

3. Enable the slider displayed against 'D-Secure File Eraser' and enter the administrator password when prompted.

4. A dialog box appears on the screen with a message "D-SecureFileEraser will not have full disk access until it is quit". Click Quit & Reopen.

Steps to Assign Full Disk Access For MacOS:

Applicable for Macs having MacOS 12 Monterey, MacOS 11 Big Sur.

1. Click Open Full Disk Access button.

2. Security & Privacy window is displayed. Go to Privacy tab.

3. From the bottom, click lock icon and enter your administrator password.

4. From the given options on the left pane, select Full Disk Access and mark D-Secure File Eraser.

5. A dialog box appears on the screen with a message "D-SecureFileEraser will not have full disk access until it is quit". Click Quit & Reopen.

Getting Familiar with User Interface

Getting Familiar with Tabs and Buttons

The D-Secure interface includes tabs for different erasure modes, buttons for actions like 'Erase Now', 'Add Items', and 'Settings'. Familiarize yourself with each element for efficient operation.

Navbar Icons

Info Icon: Click the Info icon in the navbar to view application details and version information.

Navbar Info Icon

Support & Documentation: Access support resources and documentation from the navbar.

Support and Documentation

Software Update: Check for and install software updates from the navbar.

Software Update

Help Manual: Open the help manual directly from the navbar for quick reference.

Help Manual

Dashboard Overview

Dashboard View: The main dashboard provides an overview of all erasure features and quick access to key functions.

Dashboard

Dashboard Details: The dashboard also displays recent activity, system status, and quick-start options for common erasure tasks.

Dashboard Details

Ordering the Software

To know more about D-Secure File Eraser, click here.

To purchase the software online, click here.

Alternatively, click on Buy Online icon on the Menu Bar to purchase the software online.

Select either of the methods given above to purchase the software.

Once the order is confirmed, you receive an activation key through email. You require this key to activate the software.

Activating the Software

Activate D-Secure with your license key:

  1. Access and Cloud Login Click the key icon in the top menu to open the Activation window. Select "Cloud Activation," enter your Email and Password, and click Login to verify your account status.
  2. Online Activation Select the "Online Activation" option and enter the product key received in your email into the text field. Click the "Activate" button to complete the process, or use "Get it Now" if you do not yet have a license key.
  3. Offline Activation Select the "Offline Activation" radio button to register without an active internet connection. Click "Generate Request Code" to create a code to share with the D-Secure Support Team, then enter the provided Activation Response Code and click "Activate" to finish.
  4. Offline Activation Select "Offline Activation" and click "Generate Request Code" to create a unique code for the D-Secure Support Team. Once you receive the Activation Response Code from them, enter it into the designated field and click "Activate" to register the software without an internet connection.
  5. Offline Activation Select "Offline Activation" and click "Generate Request Code" to create a unique code for the D-Secure Support Team. Once generated, the code is automatically copied to your clipboard to be shared for a response. Finally, enter the received Activation Response Code and click "Activate" to finish.

Updating the Software

D-Secure automatically checks for updates. You can also manually check via Settings → Check for Updates. Always keep your software updated for the latest features and security patches.

Software Update

Contact Information

Email: support@dsecuretech.com

Website: www.dsecuretech.com

Support Hours: 24/7 Business Hours

Working with D-Secure File Eraser

Erase Files and Folders

To securely erase files and folders:

1. Access File Erasure Mode: Navigate to the "Erase Files/Folders" tab located in the left sidebar menu. The main interface will display a designated zone labeled "Drag & Drop Files & Folders Here". You can either drag your files directly into this area or click the "Browse Files" link to manually select data from your computer.

2. Select Files or Folders Manually: If you choose to browse manually, a "Select Files or Folders" window will appear. Navigate through your local directories (e.g., C:\dsecure) to find the data you wish to remove. Select the desired file—such as "D-SecureErase.exe"—and click the "Add Selected" button to add it to the erasure queue.

3. Review the Erasure List: The selected items will now appear in the main erasure table. This list provides a detailed overview, including the checkbox to Include the file, the specific File Name, the full system Path, the item Type, and its Size. Confirm all items are correct before proceeding.

4. Initiate Erasure: Once you have verified your selection, click the "Erase Now" button located at the bottom right corner of the window. This action prepares the application to securely destroy the listed data.

5. Final Erasure Confirmation A "Confirm Erasure: dialog box will appear as a safety measure. It summarizes the Items selected and the Total files to erase. Review the warning: "This action cannot be undone". If you are certain, click "Yes, Erase" to begin the permanent deletion process.

6. Erasure Process and Monitoring: D-SecureErase will now begin shredding the files. You can monitor the progress through the Shredder Animation and the Progress Bar. The interface also displays the real-time file path currently being processed. If necessary, you can halt the operation using the red "Stop" button.

7. Review File Erasure Summary: Upon completion, a "File's & Folder's Erasure Summary" report is generated. This table confirms the File Path, Size, and shows the final Status as "Erased & Verified". Click the "OK" button to close the summary and return to the main dashboard.

Erase Files & Folders - Product Screenshots

Erase Files and Folders - Step 1
Erase Files and Folders - Step 2
Erase Files and Folders - Step 3

Erase Free Space

Erasing free space removes traces of previously deleted files from your hard drive. This comprehensive process ensures that all remnants of deleted data are permanently removed, preventing any possibility of recovery.

Select Target Volume Click on the "Erase Volume" tab in the left sidebar to view all available drives. Check the box next to the specific volume you wish to wipe (e.g., C:\ or E:) and click the "Erase Now" button to proceed.

Handling Locked Volumes If a drive appears as "Locked / Inaccessible" (e.g., F:\ [Locked]), it cannot be selected for erasure in its current state. Ensure the drive is properly connected and unlocked before attempting to check the selection box for wiping.

Confirm Erasure Once you click "Erase Now," a Confirm Erasure dialog box will appear listing the selected drive (e.g., F:). This action is permanent and cannot be undone; click "Yes, Erase" to proceed with the wiping process or "Cancel" to go back.

Permanently Wipe Selected Volume Confirm the erasure by clicking "Yes, Erase" in the dialog box. This will trigger the wiping process for the selected drive (e.g., F:), permanently removing all stored data to ensure it cannot be recovered.

Monitor Erasure Progress After confirming, the software begins wiping the drive sector by sector. You can track the real-time progress through the percentage bar and the exact sector count being processed (e.g., 20,701,184 sectors). A "Stop" button is available if you need to terminate the process immediately.

Finalizing Erasure As the process nears completion, the progress bar will reach approximately 88.9%, showing that the vast majority of sectors (e.g., 96,960,512) have been successfully wiped. Keep the software running until the bar reaches 100% to ensure every sector of the selected volume is permanently erased.

Completion Notification Once the process reaches 100%, a Volume Erasure information box will appear confirming that the "Volume erased successfully". Click the "OK" button to close the dialog and return to the main menu.

View Erasure Summary After clicking "OK" on the success dialog, a Summary table will appear. This table provides a final log of the operation, including the Target drive (F:), its Capacity (52.00 GB), the total Sectors Erased (109,043,712), and the Method used. Click the blue "OK" button at the bottom right to return to the volume selection screen.

Drive Reformatting After the volume erasure is complete, the drive will appear as unallocated or unrecognized by the system. To make it usable again, right-click the drive in your file explorer and select "Format..." to create a new file system and restore its accessibility.

Format Volume for Re-use To make the erased drive accessible again, open Windows File Explorer, right-click the wiped volume (e.g., F:), and select "Format...". In the format window, ensure "Quick Format" is selected and click "Start" to restore the drive's file system for normal use.

Formatting Complete Once the quick format is finished, a notification will appear stating "Format Complete". Click the "OK" button to finalize the process; your drive is now fully restored with a clean file system and ready for new data.

Volume Eraser - Product Screenshots

Volume Eraser - Select Volume: Select the target volume to erase from the list of available drives.

Volume Eraser - Select Volume

Volume Eraser - Confirm Erasure: Confirm the volume erasure operation before proceeding.

Volume Eraser - Confirm Erasure

Volume Eraser - Progress: Monitor the volume erasure progress in real-time.

Volume Eraser - Progress

Volume Eraser - Complete: Volume erasure completed successfully with summary details.

Volume Eraser - Complete

Deleted Data Eraser - Product Screenshots

Deleted Data Eraser - Select Drive: Choose the drive to scan for deleted data remnants.

Deleted Data Eraser - Select Drive

Deleted Data Eraser - Scanning: The software scans for deleted data traces on the selected drive.

Deleted Data Eraser - Scanning

Deleted Data Eraser - Erasing: Securely erasing all deleted data remnants from the drive.

Deleted Data Eraser - Erasing

Deleted Data Eraser - Complete: Deleted data erasure completed with Tamper-proof audit reports with certificate for verification.

Deleted Data Eraser - Complete

Erase Cloud Storage (Google Drive)

D-Secure File Eraser allows you to securely erase files stored in your Google Drive cloud storage without needing to open your account manually. This feature ensures complete privacy by permanently removing cloud-stored data.

1. Select 'Cloud Storage' tab

Note: You must be logged into your Google account for this feature to work.

2. Connect your Google Drive account

Click the "Connect" button to initiate the authorization process. A browser window will automatically open asking you to sign in. Select the Google Account you wish to link with D-Secure to proceed

3. Grant Permissions

On the consent screen titled "D-Secure wants access to your Google Account," review the access request. Click the "Continue" button to grant the necessary permissions and proceed with the connection

4. Authorization Success

Once the permissions are granted, the browser will display a confirmation page. Look for the "Success!" header followed by the message "All done. Please go back to D_CLOUDBASE". This confirms that D-Secure has successfully authenticated with your cloud account, and you can now return to the application interface

5. Connection Confirmation

Return to the D-SecureErase application. A "Status Update" dialog box will appear confirming that "Google Drive connected Successfully". Click the "OK" button to close the dialog and begin managing your cloud storage

6. Erase Cloud Volume

Select the "Erase Volume" radio button to wipe the entire contents of your cloud storage. The interface will display a "Google Drive - Storage Overview" card showing your current usage statistics (e.g., 18% used, 12.25 GB free). Check the box located on this storage card to select the volume for erasure.

6.1 Erase Specific Files and Folders

Select the "Erase Files/Folder" radio button to view your cloud directory structure. A file tree will appear showing your Google Drive folders (e.g., "Testing Data"). Expand the folders and check the boxes next to the specific files or subfolders you wish to permanently remove.

6.2 Browse File Directory

Alternatively, select the "Erase Files/Folder" radio button to access individual files instead of wiping the whole volume. The interface will load your cloud directory structure, showing the root folder (e.g., "Google Drive") and subfolders like "Testing Data (1)". This view allows you to navigate through your storage hierarchy to pinpoint specific data for removal.

7. Erase Specific Files and Folders

Select the "Erase Files/Folder" radio button to browse your cloud directory structure. A hierarchical file tree will appear, displaying your Google Drive folders and files (e.g., "Testing Data", "erase data - Copy"). Expand the directories and check the boxes next to the specific items you want to permanently erase.

7.1 Select Items to Erase

Navigate deeper into the directory tree to locate the specific data you intend to destroy. Click the checkboxes next to the individual files (such as .tmp or media files) or entire sub-folders to mark them for deletion. Ensure that the checkboxes are ticked for all items you wish to permanently remove before proceeding.

8. Confirm and Execute Erasure

After making your selection, click the "Erase Cloud Data" button. A "Confirm Cloud Erasure" dialog box will appear, displaying a summary of the items to be deleted (e.g., "3 files and 1 folders"). The dialog includes a warning that "This action cannot be undone". Click the "Yes, Erase" button to proceed with the permanent deletion of the selected cloud data

9. Erasure in Progress

Once confirmed, the application begins the secure erasure process. The interface displays a large shredding animation along with a progress bar and status message (e.g., "Starting cloud erasure...") to keep you informed. If you need to halt the operation immediately, you can click the "Stop" button located at the bottom right of the window.

9.1. Monitor Real-Time Progress

As the operation advances, the progress bar updates to reflect the percentage of completion (e.g., 33%). The status message below the bar provides specific details about the current action, identifying which file is currently being destroyed (e.g., "Erasing cloud file 1/3: deleted_..."). This allows you to track exactly which data is being processed in real-time.

10. Review Erasure Summary

When the process completes, the application presents a "Cloud File Erasure Summary" table. This report details the specific files that were processed, showing their full file paths (e.g., ".../erase data - Copy (1)"), file sizes (e.g., 103.09 MB), and their final status as "Erased". Review the details and click the "OK" button to close the summary and finish the operation.

Important Notes:

  • Erased files are permanently deleted from Google Drive and cannot be recovered
  • This feature requires an active internet connection
  • Google Drive authorization is required for first-time use
  • Erasure reports are generated for cloud storage operations

Cloud Erase - Product Screenshots

Cloud Erase - Main Interface: The cloud erase main screen showing available cloud storage options.

Cloud Erase - Main Interface

Cloud Erase - Connect Account: Connect your cloud storage account for erasure operations.

Cloud Erase - Connect Account

Cloud Erase - File & Folder Erase Confirmation: Confirm the cloud file and folder erasure operation.

Step 2: Confirm Destruction

Before the erasure begins, you will see a confirmation screen. Click Erase to proceed.

Cloud Erase - File & Folder Erase Confirmation

Cloud Erase - File & Folder Erase Progress: Monitor the cloud file and folder erasure progress.

Step 4: Completion

Once the erasure is successful, a confirmation message will be displayed.

Cloud Erase - File & Folder Erase Progress

Cloud Erase - Browse Files: Browse and select cloud files for erasure.

Cloud Erase - Browse Files

Cloud Erase - Select Items: Select specific cloud items to erase.

Cloud Erase - Select Items

Cloud Erase - Confirm Selection: Review and confirm selected cloud items for erasure.

Cloud Erase - Confirm Selection

Cloud Erase - Erasure Progress: Cloud erasure operation in progress.

Cloud Erase - Erasure Progress

Cloud Erase - Processing: Cloud data being processed for secure deletion.

Cloud Erase - Processing

Cloud Erase - Summary: Cloud erasure operation summary and results.

Cloud Erase - Summary

Cloud Erase - Volume Overview: Cloud volume storage overview and usage details.

Cloud Erase - Volume Overview

Cloud Erase - Volume Erasure: Cloud volume erasure confirmation and process.

Cloud Erase - Volume Erasure

Cloud Erase - Volume Progress: Cloud volume erasure progress tracking.

Cloud Erase - Volume Progress

Cloud Erase - Completion: Cloud erasure operation completed successfully.

Cloud Erase - Completion

Cloud Erase - Final Compliance Report: Final Tamper-proof audit report with certificate with detailed compliance results.

Cloud Erase - Final Report

Setting Schedule Erasure

Automate erasure tasks by creating schedules. Choose frequency (daily, weekly, monthly), set time, select trace categories, and save the schedule.

1. Open Scheduler Tab Click on the "Scheduler" icon in the left sidebar to access the configuration screen for automated tasks. This section allows you to create new schedules or manage existing ones to ensure your data is wiped at specific intervals.

2. Configure Task Details Define the parameters for your automated erasure:

2.1 Frequency & Timing: Set how often the task should run (e.g., "Once") and the exact Date and Time for it to start.
2.2 Task Identification: Select "New Task" and enter a descriptive Task Name (e.g., "ERASEFILES").
2.3 Select Data: Click "Browse" to choose the files or folders you want to schedule for permanent deletion.

3. Browse and Select Items Click the "Browse" button to open a file selection window. Navigate through your local directories (e.g., F:\Testing Data) and check the boxes next to the specific folders or files you wish to add to the schedule. Click the "Add" button to include these items in your task list.

4. Finalize and Save Task Once you have added the items from the browse window, they will appear in the task list showing the Name, Size, and Type. Review the details and click the "OK" button at the bottom right to save and activate your scheduled erasure task.

5. Confirm and Save Schedule Review your finalized task in the list to ensure the correct Name, Size, and Type (e.g., Folder) are displayed. Click the "OK" button to activate the schedule. An "Info" dialog box will appear confirming, "Task 'ERASEFILES' scheduled successfully". Click "OK" on the dialog box to finish the setup.

6. Finalize and Confirm Task After selecting your items, they will be listed in the task table with their Name, Size, and Type (e.g., Folder). Click the "OK" button at the bottom right to finalize the setup. An "Info" dialog box will appear to confirm that the task (e.g., 'ERASEFILES') has been scheduled successfully. Click "OK" on this dialog box to complete the process.

7. Manage Existing Tasks To view or modify your schedules, select the "Existing Task" radio button within the Scheduler interface. This will display a table of all current tasks, including the Task Name, Trigger time, and Frequency. From this view, you can select a specific task (e.g., "ERASEFILES") and use the "Edit" or "Delete" buttons to manage your automated erasure library.

8. Edit an Existing Task To modify a scheduled operation, select a task from the list and click the "Edit" button. An "Edit Task" window will appear, allowing you to update the Frequency, Start From date and time, or add/remove items using the Browse button. Once your changes are complete, click "Save" to update the automated task.

9. Update Task and Confirm After modifying the necessary details in the Edit Task window, click the "Save" button to apply the changes. An "Info" dialog box will appear to confirm that the task (e.g., 'ERASEFILES') has been updated successfully. Click "OK" on the dialog box to return to the main scheduler view.

10. Update Task and Confirm After modifying the necessary details in the Edit Task window, click the "Save" button to apply your changes. An "Info" dialog box will appear to confirm that the task (e.g., 'ERASEFILES') has been updated successfully. Click "OK" on the dialog box to return to the main scheduler view.

11. Monitor Scheduled Execution When a scheduled task reaches its set time, a dedicated Scheduler progress window will automatically appear. This window allows you to track the erasure in real-time, showing:

12. Final Completion and Report Generation When the task finishes, the progress bar will reach 100%, and the interface will display a green checkmark indicating "Scheduled erasure completed!". The system will also confirm the total number of items processed (e.g., "All 58 files erased") and state that a "Report generated successfully". You can now safely close the scheduler window.

Scheduler - Product Screenshots

Scheduler - Main Interface: The scheduler main screen for creating and managing automated erasure tasks.

Scheduler - Main Interface

Scheduler - Task Configuration: Configure task frequency, timing, and data selection for scheduled erasure.

Scheduler - Task Configuration

Scheduler - Browse Items: Browse and select files or folders to add to the scheduled erasure task.

Scheduler - Browse Items

Scheduler - Task List: View and manage all scheduled erasure tasks with their details.

Scheduler - Task List

Scheduler - Execution: Monitor scheduled task execution progress and completion status.

Scheduler - Execution

Compliance Reporting & Audit Management

Understanding Report Structure

Every Tamper-proof audit report with certificate generated by D-Secure follows a standardized compliance structure to ensure audit readiness:

Standard Report Layout:

  • 1

    Page 1: Certificate of Erasure

    This is the legality page that certifies the successful erasure process, including machine details and compliance standards used.

  • 2

    Page 2 onwards: Summary & Annexure

    Detailed technical summaries, hardware logs, and annexures that provide granular evidence of the data destruction process.

Preview Compliance Report

The Preview Report feature allows you to review the Tamper-proof audit reports with certificate before saving. This section ensures all compliance data is accurately captured.

1. Access Reports Section: Navigate to the "Reports" tab from the main dashboard. This section displays a chronological list of all erasure operations performed, including the date, time, erasure type (Files/Folders, Free Space, etc.), and status of each operation.

2. Select Report to Preview: Browse through the list of generated reports and click on the specific report you wish to preview. You can use the search and filter options to quickly locate reports by date range, erasure type, or status. The selected report will be highlighted in the list.

3. Click Preview Button: With the report selected, click the "Preview" button located in the toolbar or action panel. This will open a new window displaying the complete report in a formatted, easy-to-read layout.

4. Review Report Details: The preview window shows comprehensive information including erasure summary, list of erased items with their original paths and sizes, erasure algorithm used, verification method applied, timestamp, technician information, and any custom fields or company branding configured in settings. Scroll through all sections to verify accuracy.

5. Navigate Report Sections: Use the navigation controls within the preview window to move between different sections of the report such as Summary, Detailed Item List, Algorithm Information, and Verification Results. This allows you to thoroughly review each aspect of the erasure operation.

6. Close or Proceed: After reviewing the report, you can either close the preview window if you need to make changes to report settings, or proceed directly to save the report or send it to D-Secure Cloud using the action buttons provided in the preview window.

Reports - Product Screenshots

Reports - Overview: The reports section showing a list of all generated erasure reports with details.

Reports - Overview

Reports - Report Details: Detailed view of an erasure report with comprehensive information.

Reports - Report Details

Save Compliance Report

Saving Tamper-proof audit reports with certificate provides permanent documentation of all compliance-verified data deletion operations.

1. Select Report from Reports Tab: Open the Reports section from the main navigation menu. The interface displays all generated reports in a comprehensive list view. Locate the specific report you wish to save by browsing the list or using the search functionality to filter by date or erasure type.

2. Click Save Report Button: Select the desired report by clicking on it to highlight the entry. Then click the "Save Report" button located in the toolbar or right-click context menu. This action will open the save report dialog window where you can configure export options.

3. Choose Report Format: The save dialog presents multiple format options for your report. Select PDF format for professional, universally compatible reports that include digital signatures and cannot be easily modified. PDF reports maintain formatting across all platforms and are ideal for official documentation and compliance requirements.

4. Select Destination Folder: Click the "Browse" button to open the file explorer window. Navigate through your computer's directory structure to select the folder where you want to save the report. You can create a new folder if needed by right-clicking and selecting "New Folder". Choose a location that is easily accessible and properly backed up.

5. Configure File Name: In the file name field, enter a descriptive name for your report. The default naming convention typically includes the erasure type, date, and time stamp. You can customize this to match your organization's file naming standards for easier identification and archival.

6. Complete Save Process: Review all your selections to ensure the format, location, and filename are correct. Click the "Save" button to export the report. A progress indicator will appear briefly, and upon successful completion, a confirmation message will display. The saved report is now available at your chosen location and can be shared, printed, or archived as needed.

Send Compliance Report to D-Secure Cloud

D-Secure Cloud provides secure, encrypted cloud storage for your Tamper-proof audit reports with certificate, enabling remote access and centralized compliance management.

1. Verify Cloud Account Login: Before uploading reports, ensure you are logged into your D-Secure Cloud account. Check the cloud status indicator in the top right corner of the application. If not logged in, click on the cloud icon and enter your D-Secure Cloud credentials (email and password) to authenticate.

2. Navigate to Reports Section: Open the Reports tab from the main navigation menu. This displays a comprehensive list of all erasure reports generated by the application, including those already uploaded to cloud (marked with a cloud icon) and those stored locally only.

3. Select Reports for Upload: Review the list and select one or more reports you wish to send to D-Secure Cloud by checking the boxes next to each report entry. You can select multiple reports simultaneously for batch upload. Reports already synchronized with cloud will be indicated with a special marker.

4. Initiate Cloud Upload: With your reports selected, click the "Send to Cloud" button located in the toolbar at the top of the reports interface. This will prepare the selected reports for secure upload to your D-Secure Cloud account.

5. Confirm Upload Operation: A confirmation dialog will appear showing the number of reports to be uploaded and estimated upload size. Review this information and click "Yes, Upload" to proceed. The application will begin securely encrypting and transferring the reports to D-Secure Cloud servers.

6. Monitor Upload Progress: A progress indicator displays the upload status for each report, showing percentage completed and estimated time remaining. Once upload is complete, a success notification appears, and the reports are marked as synchronized. You can now access these reports from any device by logging into your D-Secure Cloud Console.

Change Report Settings

Report settings allow you to customize the appearance and content of erasure reports to match your organization's branding and documentation requirements.

1. Access Settings Menu: Click on the Settings icon (gear/cog icon) located in the top navigation bar or main menu. This opens the comprehensive settings panel where you can configure various aspects of the application's behavior and appearance.

2. Navigate to Report Settings: Within the Settings panel, locate and click on "Report Settings" from the left sidebar menu. This section contains all customization options related to erasure report generation, formatting, and content.

3. Configure Company Information: In the Company Details section, enter your organization name, address, phone number, email, and website. This information will appear in the header or footer of all generated reports, providing professional branding and contact information.

4. Upload Company Logo: Click the "Upload Logo" button to select your company logo image file from your computer. Supported formats include PNG, JPG, and SVG. The logo will be displayed prominently on your reports. You can adjust the logo size and position using the alignment options provided.

5. Set Technician Information: Enter the default technician name, title, and digital signature details. You can upload a signature image or create a digital signature. This information certifies who performed the erasure operation and adds authenticity to the report.

6. Customize Report Fields: Enable or disable optional fields such as customer information, device serial numbers, custom notes, or additional metadata fields. Configure which sections should appear in the report and in what order to match your documentation standards.

7. Save Configuration: After making all desired changes, click the "Save Settings" button at the bottom of the page. A confirmation message will appear, and all future reports will be generated using these customized settings. You can return to modify these settings at any time.

Configuring Settings

General Settings

Change Themes

D-Secure File Eraser supports multiple visual themes to enhance user comfort and reduce eye strain during extended use. Choose from Light Mode, Dark Mode, or System Default settings.

1. Open Settings Panel: Click on the Settings icon (gear/cog) located in the main navigation bar at the top of the application window. This will open the comprehensive settings configuration panel with various customization options.

2. Navigate to General Settings: In the Settings panel, locate and click on "General Settings" or "Appearance" from the left sidebar menu. This section contains interface customization options including theme selection, language preferences, and display settings.

3. Locate Theme Options: Scroll to the "Theme" or "Appearance Mode" section within General Settings. You will see three available theme options: Light Mode, Dark Mode, and System Default. Each option includes a preview showing how the interface will appear.

4. Select Light Mode: Click on the "Light Mode" option if you prefer a bright, traditional interface with dark text on light backgrounds. This mode is ideal for well-lit environments and provides maximum contrast for easy readability during daytime use.

5. Select Dark Mode: Choose "Dark Mode" for a darker color scheme with light text on dark backgrounds. This mode is easier on the eyes in low-light environments, reduces screen brightness, and is preferred by many users for extended work sessions, especially during evening hours.

6. Select System Default: The "System Default" option automatically synchronizes the application theme with your operating system's theme settings. If your OS is set to Dark Mode, the application will use Dark Mode, and vice versa. This option is convenient for users who want consistency across all applications.

7. Apply Theme Changes: After selecting your preferred theme, the change is applied immediately without requiring application restart. The entire interface will transition to the new theme, affecting all windows, dialogs, and panels. Your theme preference is automatically saved and will persist across application sessions.

Settings - Product Screenshots

Settings - General: The main settings panel with all configuration options.

Settings - General

Settings - Ignore List: Configure the ignore list to exclude specific files or folders from erasure operations.

Settings - Ignore List

Settings - Appearance: Customize the application appearance including theme and display preferences.

Settings - Appearance

Settings - Language: Change the application language to your preferred language option.

Settings - Language

Select Erasure Options

Erasure options allow you to configure the default security algorithms, verification methods, and other preferences that control how data is permanently deleted from your system.

1. Access Settings Menu: Click on the Settings icon in the main navigation bar to open the settings panel. This centralized location provides access to all application configuration options.

2. Navigate to Erasure Settings: In the Settings panel, locate and click on "Erasure Options" or "Erasure Settings" from the sidebar menu. This section contains all configuration options related to data erasure algorithms, verification, and security preferences.

3. Select Default Erasure Algorithm: From the "Default Algorithm" dropdown menu, choose your preferred erasure standard. D-Secure offers 20+ internationally recognized algorithms including DoD 5220.22-M (3-pass), DoD 5220.22-M ECE (7-pass), Gutmann (35-pass), NIST 800-88, and others. Higher pass counts provide greater security but require more time. For most users, DoD 5220.22-M provides excellent security with reasonable speed.

4. Configure Verification Method: Enable the "Verify Erasure" option to ensure data has been completely removed. Select from verification methods such as "Quick Verification" (spot checks random sectors), "Full Verification" (checks all erased sectors), or "No Verification" (faster but less certain). Full verification is recommended for sensitive data.

5. Set Additional Preferences: Configure optional settings such as "Delete files after erasure" (removes file entries immediately), "Show confirmation dialogs" (prompts before each operation), "Enable sound notifications" (audio alerts on completion), and "Generate automatic reports" (creates documentation for each erasure task).

6. Configure Performance Options: Adjust settings like "Maximum CPU usage" to control how much system resources the erasure process can utilize. Lower settings reduce impact on other applications but extend erasure time. "Process priority" can be set to Low, Normal, or High depending on your requirements.

7. Save Configuration: After configuring all options according to your security requirements and preferences, click the "Save Settings" or "Apply" button at the bottom of the panel. These settings will become the default for all future erasure operations. You can modify these settings at any time, and changes can be applied per-operation if needed.

Login to D-Secure Cloud

Login to D-Secure Cloud to access cloud-based report management, synchronization, and remote access features. Follow these steps to authenticate your account:

Access Activation Window Click the key icon in the top toolbar to open the Activation dialog. Select the "Cloud Activation" radio button to use your registered account

Enter Credentials Enter your registered Email and Password in the provided text fields. The Status field will show "Disconnected" until you successfully log in.

Complete Login Click the "Login" button to verify your credentials and activate the software via the cloud.

Generate Offline Request If you choose "Offline Activation," click the "Generate Request Code" button to create a unique machine identifier. A pop-up will confirm that the code has been generated and automatically copied to your clipboard.

Submit and Activate Share the generated code with the D-Secure Support Team to receive your Activation Response Code. Once received, paste it into the response field and click the "Activate" button to complete the registration without an internet connection.

Frequently Asked Questions (FAQs)

1. What does the demo version of D-Secure File Eraser do?

The demo version of the software only allows you to select and list traces of files, folders, web browsers, applications or systems files. To perform any erasure, you must purchase and register the software.

2. Why do I need to use D-Secure File Eraser?

When you delete a file from your system, the data is not actually erased. It is just marked as deleted and the space it was using is made available for other files to be stored. This means that the data can still be recovered by using data recovery software. D-Secure File Eraser helps you to securely and permanently erase files, applications and internet traces from your system thereby ensuring your data privacy. Also, the 'Erase Free Space' feature of the software completely erases data in the free space (free hard drive space) which leaves no possibility of data to be recovered.

3. Does D-Secure File Eraser remove data beyond recovery?

Yes, D-Secure File Eraser removes data beyond recovery.

4. Does erasure cause any harm to my hard drive?

Erasing data using D-Secure File Eraser does not cause any harm to the hard drive.

5. Can I erase a specific file using D-Secure File Eraser?

Yes, you can erase specific files by adding them to the erasure list or dragging the items and dropping them in the software or you can also erase selected files through Search & Erase option.

For more information, refer to Erase Files and Folders section.

6. What if data of the application traces are not erased after the complete erasure process?

It happens in case you have not closed the application during the erasing process or if you are viewing newly created files and folders after the application has restarted on completing an erasure process.

7. What if the data of System Traces are not erased after the completion of an erasure process?

This problem arises if you view the recently created files or folders, as the operating system automatically creates some system traces at different time intervals.

8. What are passes in Erasing algorithms?

Passes in erasing algorithms are number of times overwriting process is repeated. For example, in Peter Gutmann method, a series of 35 patterns is written over the region to be erased.

9. Which algorithm should I choose for the best erasure?

It depends upon how many times an algorithm overwrites the data precisely or the number of passes used to erase the data. The more the number of passes used by the algorithm, more effective it is. Each algorithm performs a different set of features from which you can choose the suitable algorithm as per the requirement. See List of Erasure Algorithms and their Descriptions, to know more.

10. What if the software is taking too long to erase the data?

It depends on the size of the data you are erasing, the configuration of the system and the algorithm you are using to erase the data. A large amount of data, lower configuration and more number of passes may consume more time for erasure.

11. If a single overwrite can erase hard disk securely enough, why are there so many data sanitization algorithms?

Not everyone agrees on a data sanitization algorithm that will prevent all possible methods of recovering the data. Since many advanced, hardware based methods of extracting information from hard drives exist, several governmental organizations and researchers have independently devised certain methods of overwriting data that, according to their research, should prevent these advanced recovery methods from working.

12. Which types of files cannot be erased using D-Secure File Eraser?

System files are crucial files that are used by operating systems to run your computer. So it is not possible to erase system files.

13. Is it possible to erase specific internet activities instead of clearing all of them?

Yes, you can choose specific items or internet activities from the list of browsers you want to erase. See Erase Internet Traces, to know more.

14. What if I lose or misplace compliance reports on my system?

The application provides functionality to send Tamper-proof audit reports with certificate to Cloud. See Send Compliance Report to D-Secure Cloud to know more.

15. Can I preview and save the compliance reports?

Yes, you can do it. Refer to Preview and Save section under Compliance Reporting to know more.

16. Can I get reports for my erasure compliance?

Yes, D-Secure File Eraser provides detailed Tamper-proof audit reports with certificate. See Compliance Reporting for more details.

17. Can I use D-Secure File Eraser to erase the free space on the primary partition of my hard drive?

Yes, it is secure to use D-Secure File Eraser to erase data in the free space of the hard drive's primary partition as it removes the free space left after deletion of files and folders.

18. What is the process for scheduling an erase traces task for a specific browser?

To schedule an erasure task for a specific browser, you need to configure the default settings for that browser in the D-Secure File Eraser settings. After that, you can schedule the erasure task using the schedule erasure tab for the desired duration.

Follow the steps below to schedule an erase traces task for a specific browser:

  1. Click on the Settings icon displayed on the screen.
  2. Select Erase Traces tab from the Settings window that appears next.
  3. Select Internet Activity tab.
  4. Choose the browser you want to schedule to erase traces and click OK.
  5. Select Schedule Erasure from Select Option displayed on the left pane of the screen.
  6. Select Erase Traces tab from the right pane of the screen.
  7. Choose the required frequency period and specific time for running the eraser task.
  8. Click OK to schedule.

Once you have scheduled the erase traces task for the particular browser, it will run automatically at the designated time and date, erasing all the traces of your browsing history, cookies, and related data.
To know more, please refer to Set Schedule Erasure for Erase Traces section.

19. Is it possible for the software to automatically erase traces of any files or folder?

Yes, D-Secure File Eraser provides an option to schedule eraser task to perform automatically at predefined period. Refer to Set Schedule Erasure for Files and Folders section to schedule erasure task automatically.

About D-Secure

D-Secure is a leading provider of data sanitization and security solutions. Our mission is to provide robust, reliable, and user-friendly data erasure solutions that empower organizations to manage their data lifecycle securely and meet stringent regulatory requirements with confidence.

Need further assistance?

Contact Support

© 2026 D-SecureTech. All rights reserved.

AI Documentation and Project Summary