Use cipher command to completely delete data

Source: Internet
Author: User

MS-DOS command syntax

Cipher ({/e|/d}] [/s:dir] [/a] [/i] [/f] [/q] [/h] [/k] [/u[/n]] [PathName [...]] | [/r:pathnamewithoutextension] | [/w:pathname]

MS-DOS Command parameters
/E
encrypts the specified folder. After the folder has been tagged, the files that are added to the folder later are also encrypted.
/d
decrypts the specified folder. After the folder has been tagged, the files that are added to the folder later are also encrypted.
/s:dir
performs the selected action in the specified folder and all its subfolders.
/A
perform file and directory operations.
/I
continues execution of the specified operation even if an error occurs. By default, cipher stops when an error is encountered.
/F
encrypts or decrypts all the specified objects. By default, cipher skips encrypted or decrypted files.
/q
only the most basic information is reported.
/h
displays files with hidden or system attributes. By default, these files are not encrypted or decrypted.
/k
creates a new file encryption for the user running cipher. If you use this option, Cipher ignores all other options.
/u
updates the encryption key for the user file or restores the proxy key to the current file in all encrypted files on the local drive (if the key has changed). This option is only used with/N.
/n
prevent key updates. Use this option to find all encrypted files on a local drive. This option is used only with/U.
PathName
specifies a style, file, or folder.
/r:pathnamewithoutextension
generate a new recovery agent certificate and private key, and then write them to the file (the name of the file is specified in pathnamewithoutextension). If you use this option, Cipher ignores all other options.
/w:pathname
Delete unused portions of data on the volume. PathName represents any directory on the requested volume. If you use this option, Cipher ignores all other options.
/?
displays help at the command prompt.
MS-DOS Command comments
    • using/w

      /w deletes part of the data for a volume that can be accessed and is not assigned to a file or directory. Because it does not lock the drive, other programs can get space on the drive, and this space cipher cannot be deleted. Because this option performs write operations on most of the hard disk volume, it takes a long time to complete and is used only when necessary.

    • Encrypt or decrypt a file

      To prevent encrypted files from becoming decrypted when they are modified, it is recommended that you encrypt both the file and the folder in which it resides.

    • Using read-only files and folders

      Cipher cannot encrypt files that are marked as read-only.

    • Use multiple folder names

      You can use more than one folder name and a wildcard character.

    • Using multiple parameters

      There is at least one space separating each parameter.

MS-DOS Command examples

To use cipher to encrypt the May subfolder in the Monthlyreports folder, type:

cipher/e Monthlyreports\may

To encrypt the January to December subfolder in the Monthlyreports folder and the Manufacturing subfolder in the month subfolder, type:

cipher/e/s:monthlyreports

If you only want to add the Marketing.xls file in the May subfolder, type:

cipher/e/A Monthlyreports\may\marketing.xls

To encrypt the Marketing.xls file, the Maintenance.doc file, and the manufacturing subfolder in the May folder, type:

cipher/e/A monthlyreports\may\ma*

To determine if May is encrypted, type:

Cipher Monthlyreports\may

To determine which files are encrypted in the May folder, type:

Cipher monthlyreports\may\*

Use cipher command to completely delete data

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.