Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
File deletion
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Removal of a file from a computer's file system}} {{Use American English |date=February 2024}} {{Use mdy dates |date=February 2024}} {{More citations needed|date=February 2024}} '''File deletion''' is the removal of a [[computer file|file]] from a computer's [[file system]]. All operating systems include commands for deleting files ('''[[rm (Unix)|rm]]''' on [[Unix]] and [[Linux]],<ref name="rm23" /> '''[[del (command)|era]]''' in [[CP/M]] and [[DR-DOS]], '''[[del (command)|del]]'''/'''erase''' in [[MS-DOS]]/[[IBM PC DOS|PC DOS]], DR-DOS, [[Microsoft Windows version history|Microsoft Windows]] etc.). [[File manager]]s also provide a convenient way of deleting files. Files may be deleted one-by-one, or a whole blacklist directory tree may be deleted. ==Purpose== Examples of reasons for deleting files are: * Freeing the disk space * Removing duplicate or unnecessary data to avoid confusion * Making [[Information sensitivity|sensitive information]] unavailable to others * Removing an operating system or blanking a hard drive ==Accidental removal== {{see also|Data recovery}} A common problem with deleting files is the accidental removal of information that later proves to be important. A common method to prevent this is to [[Backup|back up]] files regularly. Erroneously deleted files may then be found in archives. Another technique often used is not to delete files instantly, but to move them to a [[Temporary folder|temporary directory]] whose contents can then be deleted at will. This is how the "[[trash (computing)|recycle bin]]" or "trash can" works. [[Microsoft Windows]] and Apple's [[macOS]], as well as some Linux distributions, all employ this strategy. In [[MS-DOS]], one can use the [[Undeletion|undelete]] command. In MS-DOS the "deleted" files are not really deleted, but only marked as deleted—so they could be undeleted during some time, until the disk blocks they used are eventually taken up by other files. This is how data recovery programs work, by scanning for files that have been marked as deleted. As the space is freed up per byte, rather than per file, this can sometimes cause data to be recovered incompletely. [[Defragmentation|Defragging]] a drive may prevent undeletion, as the blocks used by deleted file might be overwritten since they are marked as "empty". Another precautionary measure is to mark important files as [[File-system permissions|read-only]]. Many [[operating system]]s will warn the user trying to delete such files. Where [[file-system permissions]] exist, users who lack the necessary permissions are only able to delete their own files, preventing the erasure of other people's work or critical system files. ==Sensitive data== {{see also|Data remanence}} The common problem with sensitive data is that deleted files are not really erased and so may be recovered by interested parties. Most [[file system]]s only remove the link to data. But even overwriting parts of the disk with something else or formatting it may not guarantee that the sensitive data is completely unrecoverable. Special software is available that overwrites data, and modern (post-2001) ATA drives include a secure erase command in firmware. However, high-security applications and high-security enterprises can sometimes require that a disk drive be physically destroyed to ensure data is not recoverable, as microscopic changes in head alignment and other effects can mean even such measures are not guaranteed. When the data is encrypted only the encryption key has to be unavailable. [[Crypto-shredding]] is the practice of 'deleting' data by (only) deleting or overwriting the encryption keys. ==See also== * [[Crypto-shredding]] * [[Data erasure]] ==References== {{reflist |refs= <ref name="rm23">{{cite web |title=rm(1) β Linux manual page |date=August 2023 |website=The man-pages project |url=https://www.man7.org/linux/man-pages/man1/rm.1.html |access-date=2024-02-03 }}</ref> }} {{Data erasure}} [[Category:File deletion| ]]
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Data erasure
(
edit
)
Template:More citations needed
(
edit
)
Template:Reflist
(
edit
)
Template:See also
(
edit
)
Template:Short description
(
edit
)
Template:Use American English
(
edit
)
Template:Use mdy dates
(
edit
)