The BCWipe system provides the following ways to shred contents of deleted files:


  • Delete with wiping.
    Using the ‘Delete with wiping’ command, you can wipe individual and selected groups of files or folders. BCWipe also wipes the file slack, file attributes, and (for NTFS) alternate data stream if it exists.

  • Wipe free space.
    When you delete sensitive files using a standard Windows ‘Delete’ command, the operating system does not permanently erase the contents of the documents from your hard drive. Instead, the OS just marks the disk space that was previously occupied by the files as ‘free’. To remove all traces of the previously deleted files, use the ‘Wipe free space’ command to wipe free space on the disk where the files were stored.

    The ‘Reserved Space’ functionality significantly cuts the time needed to wipe free space by preserving previously wiped space in a clean state.

  • Wipe Browser History.
    BCWipe can completely wipe all traces of your Browser history, including the cache, cookies, browsing history, search history, saved passwords, last active tabs, etc. Supported web browsers include the latest versions of Internet Explorer, Edge, Mozilla Firefox, Google Chrome, Opera and more.

  • Wipe Local History.
    BCWipe can wipe the names of files opened with Windows components and other popular applications. Names stored on a subfolder or Windows Registry can be wiped.

  • Swap file protection.
    This BCWipe utility can wipe unused space in the swap file, or keep the whole swap file encrypted.

  • Wipe file slacks.
    File slacks are the disk space from the end of the actual file up to the end of the last cluster used by the file. You can turn slack wiping on and off before running the ‘Wipe Free Space’ process.

  • Wipe MFT records - for NTFS drives.
    The MFT (Master File Table) is a reserved space on NTFS disks where the file system stores the names and attributes of files. Small files may reside inside the MFT completely. After using the ordinary Windows ‘Delete’ operation, Windows marks the corresponding MFT record as 'unused'. In this case, Windows does not erase the MFT entry contents, which is why file recovery software works. The name of any file that has been ‘deleted’ by Windows can be restored by file recovery software, and if the file body has not been overwritten then the contents of the file can also be recovered. BCWipe can wipe empty MFT Records, which are records related to deleted files, beyond forensic recovery.

  • Wipe directory slacks.
    NTFS directory is a special file that contains the names and subdirectories of files. The disk cluster that belongs to a directory is called a directory node. Directory nodes have something known as a slack, which is the space from the end of the directory data to the end of the disk cluster. On FAT/exFAT file systems, the file names are stored in so-called directory entries. The slack of the directory node or directory entry may still contain the name of the deleted file, as well as other deleted data.

  • Wipe NTFS transactions log file.
    NTFS is a journaling file system and uses the NTFS Log ($LogFile) to record temporary data for all files you were working with. The ‘Transactions Log’ file is used to restore your file system in case of a failure.

  • Transparent Wiping.
    The ‘Transparent Wiping’ command automatically wipes the contents of every file and folder deleted by your applications or operating system. This functionality is activated by creating the ‘Transparent Wiping’ task in BCWipe Task Manager.

  • Wipe Compressed Files
    Compressed files cannot be wiped by conventional means. BCWipe contains a special module that can read disk sectors on a low level. Due to this module, BCWipe can wipe compressed files. Administrator rights are required to wipe compressed files.

  • Disk-level verification.
    BCWipe contains a special module that can read disk sectors on a low level. Due to this module, BCWipe can run an advanced verification of the wiping process by directly reading results from physical disk sectors. Administrator rights are required to run this type of verification.


The following tools allow users to configure and control the wiping process:

  • BCWipe Task Manager.
    This utility allows you to configure BCWipe to run wiping tasks automatically. You can set a specific time to run the task and select special options for the task. BCWipe Task Manager is used by administrators to configure automatic tasks on user computers.

  • Privacy Guard.
    BCWipe Privacy Guard analyzes current privacy settings and reports how strong it compares to the settings recommended by Jetico. The "Jetico recommended settings" preset allows achieving high privacy with no interruption to regular workflow. When enabled, about 80% of the entire number of privacy-related settings will be disabled. Some settings like app access to camera and microphone or support for OneDrive will be kept enabled to maintain compatibility with some daily-use apps. 

  • Reserved Space Manager.
    Wiping free space is a time-consuming process. On larger modern disks with terabytes of free space, it may take several days to complete. The ‘Reserved Space’ functionality of BCWipe is intended to save time by preserving the wiped space in a clean state. The Reserved Space Manager allows users to manage free and reserved disk space.

  • Wiping Scheme Editor 
    Allows you to create custom wiping schemes.

  • Swap File Encryption utility.
    The swap file is the Windows system file that is used for virtual memory support, and it can store parts of documents you are working with in an opened form on your hard drive. Even if some powerful encryption program encrypts an original document, Windows can put the whole or part of the document to the swap file in an opened form. Encryption keys, passwords, and other sensitive information can also be swapped to the hard drive. Even if you make use of all the security advantages of the latest version of Windows, a simple investigation of the swap file in DOS mode may allow for a lot of information to be extracted from the file. BCWipe allows you to encrypt the contents of swap files, which prevents leaks in the operating system.

  • Hexadecimal File Viewer. 
    Using the ‘Hexadecimal File Viewer’, you can examine the contents of files after wiping them. This utility is useful for investigating the quality of the wiping process, such as when you are using a custom wiping scheme.
  • Log Viewer.
    This is a convenient tool for reading, searching, and filtering information about the wiping process.
  • Automatic Update utility.
    The ‘Automatic Update’ utility allows you to get the latest software updates automatically.