Wipe (securely delete) source files after encryption

S.S.E. File Encryptor's "Custom command execution" feature is very powerful and can be used for various tasks, however, is recommended only for experienced users.

An example configuration for "Wipe source after encryption" function follows.


Windows - Using Sysinternals SDelete

1. Download Sysinternals SDelete


2. Extract the archive and copy an appropriate version of SDelete (sdelete.exe for Windows 32 or sdelete64.exe for 64 bit systems) to SSE's folder.




3. Run sdelete manually for the first time (double click on sdelete.exe or sdelete64.exe) and agree with the license agreement (if the agreement is displayed—sometimes is not).


4. Enable "Custom command execution" in S.S.E. settings and place the following command into "After Encryption" text field:

sdelete -p 2 -nobanner -s <original-path> (Windows 32)
or
sdelete64 -p 2 -nobanner -s <original-path> (Windows 64)

Custom command execution - S.S.E. File Encryption Settings

Note: You can modify the command line parameters at your will - for more passes wipes use -p 3, -p 4, etc.


5. S.S.E. will be using the secure delete function from now on.

Secure delete by SDelete in S.S.E. File Encryption

Mac OS X - Using rm -P

Mac OS X users can use rm -P command which is part of the system. So simply Enable "Custom command execution" in S.S.E. settings and place the following command into "After Encryption" text field:

rm -P -rf <original-path>


<< S.S.E. File Encryptor