Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data.
英
美
其他方法,包括一所界定的國家工業(yè)安全程序操作手冊的美國國防部和覆蓋與偽隨機數據。You can also define your own overwriting methods.;您也可以定義自己的覆蓋的方法。