To permanently delete files, you must overwrite their data on the drive. Normal deletion (including Shift+Delete and emptying the Recycle Bin) only removes the file reference while leaving the data intact and recoverable. The fastest method: install Univik File Eraser, right-click the file you want to destroy, select the erasure standard (DoD 5220.22-M recommended) and the file is permanently overwritten beyond any possibility of recovery.
Introduction
There is no built-in way to permanently delete a file in Windows or macOS. Every deletion method that ships with these operating systems (Delete key, Shift+Delete, empty Recycle Bin, empty Trash) removes only the directory entry that points to the file. The actual data stays on the drive, recoverable by anyone with free software.
Permanent deletion requires overwriting the physical storage locations where the file’s data resides. This guide covers four methods to accomplish this on both Windows and Mac, from the simplest right-click approach to command-line options for advanced users. Each method ensures that recovery software finds only overwrite patterns instead of your original data.
Why Normal Deletion Does Not Work
When you delete a file, the operating system removes its entry from the file system table (the NTFS Master File Table on Windows or the APFS Catalog on Mac). The file’s data remains in the same physical sectors on the drive. Recovery software ignores the file table entirely and scans these sectors directly, finding your “deleted” files fully intact.
This applies to every standard deletion method. Pressing Delete moves the file to the Recycle Bin where it is not deleted at all. Shift+Delete skips the Recycle Bin but still only removes the table entry. Emptying the Recycle Bin does the same. Even quick-formatting a drive only rebuilds the file table without touching the data sectors. None of these methods overwrite a single byte of your file’s actual content.
Method 1: Permanently Delete Files with Univik File Eraser
Univik File Eraser adds secure deletion to your standard file management workflow. It overwrites the selected files with the erasure pattern you choose and then removes the file entries from the directory.
Step 1: Open Univik File Eraser and select the Wipe Files/Folders mode.
Step 2: Add the files or folders you want to permanently destroy. You can drag and drop files directly into the application window or use the Add Files/Add Folders button to browse.
Step 3: Choose your erasure standard. DoD 5220.22-M (3-pass) is recommended for most situations. For quick personal use, a single random-data pass is sufficient. For maximum security, select Gutmann (35-pass).
Step 4: Click Start and wait for the process to complete. The software overwrites each file’s data sectors with the chosen pattern, verifies the overwrite and then removes the file entry. After completion, no recovery tool can reconstruct the original file.
This method is ideal for destroying individual sensitive files as you work with them: tax returns after filing, confidential client documents after a project ends, personal photos you want gone permanently or old password lists you no longer need.
Method 2: Permanently Delete Files Using Command Line
Windows and Mac provide limited command-line options for secure deletion. These methods are less thorough than dedicated software but can serve in situations where you cannot install additional applications.
Windows (PowerShell): The cipher command can overwrite free space but cannot target specific files. After deleting a file normally, run:
cipher /w:C:\path\to\folder
This overwrites all free space in the specified folder’s drive with three passes (zeros then ones then random data). The limitation is that it works only on free space, not on specific files. You must delete the file first and then run cipher to overwrite the freed space. It also takes significant time on large drives.
macOS Terminal: The rm -P command was historically available for secure deletion but Apple removed its secure-delete functionality in macOS Catalina (10.15) and later. On modern macOS, there is no built-in command for secure file deletion. Apple’s position is that APFS encryption and TRIM make separate secure deletion unnecessary, though this does not address all threat scenarios.
For both platforms, dedicated erasure software like Univik File Eraser provides more reliable results because it directly overwrites the target file’s sectors before removing it rather than relying on the indirect approach of overwriting free space after deletion.
Method 3: Destroy Previously Deleted Files
If you have already deleted sensitive files through normal means (Recycle Bin or Shift+Delete), those files are still on your drive right now. You cannot use Method 1 on them because the file entries no longer exist. Instead, you need to overwrite the free space where those deleted files reside.
Using Univik File Eraser: Select the Wipe Free Space mode. Choose the drive containing the deleted files. Select your erasure standard and click Start. The software scans and overwrites every available sector on the drive. Your current files and operating system are not affected because only sectors marked as “free” (where deleted files live) are overwritten.
This is particularly important if you have been using your computer for months or years without secure deletion. Every file you have ever deleted (documents and photos and emails and browser downloads and temporary files) may still exist on the drive in recoverable form. A single Wipe Free Space operation destroys all of them at once.
Using Windows cipher: Open an elevated Command Prompt and run cipher /w:C:\ to overwrite free space on the C: drive. This performs three overwrite passes. It is slower than Univik File Eraser and does not generate a completion report but it works without installing software.
Method 4: Permanently Delete Files on Mac
macOS no longer offers a built-in secure delete option. Apple removed “Secure Empty Trash” in OS X El Capitan (10.11) and removed the rm -P secure flag in macOS Catalina (10.15). Current macOS versions rely on APFS encryption and SSD TRIM for data protection.
For Macs with T2 or Apple Silicon (M1/M2/M3/M4): These Macs encrypt the drive by default using hardware encryption. Erasing the drive through System Settings > General > Transfer or Reset > Erase All Content and Settings destroys the encryption key, making all data on the drive unreadable. This is effective for full-drive erasure scenarios (such as selling the Mac) but does not help when you need to permanently destroy individual files while keeping the rest of your data.
For individual file deletion on Mac: Use a third-party secure deletion tool. The process is the same as on Windows: select files, choose an overwrite standard and execute. If you use Univik File Eraser through a Windows partition or virtual machine, you can target files on shared or external drives formatted in FAT32 or exFAT.
For older Macs with HDD (no T2 chip): The disk is not encrypted by default. Use Disk Utility to write zeros to free space: open Disk Utility, select the drive, click Erase Free Space and choose the number of passes. This addresses previously deleted files but does not target specific active files.
Which Erasure Standard to Choose
| Scenario | Recommended Standard | Passes | Time (1 GB file) |
|---|---|---|---|
| Personal files (photos and documents) | Random Data (single pass) | 1 | ~30 seconds |
| Financial records and tax documents | DoD 5220.22-M | 3 | ~90 seconds |
| Client data and business contracts | DoD 5220.22-M | 3 | ~90 seconds |
| Healthcare records (HIPAA) | NIST 800-88 Purge | 1 + verify | ~45 seconds |
| Government classified data | DoD 5220.22-M ECE | 7 | ~3.5 minutes |
| Maximum theoretical security | Gutmann | 35 | ~17 minutes |
For most users, the DoD 5220.22-M (3-pass) standard provides the best balance of speed and certainty. A single random-data pass is sufficient to prevent recovery by any known software tool. The additional passes in DoD and Gutmann provide documentation-grade assurance for regulatory and legal requirements. On SSDs, NIST guidelines recommend a single pass because flash memory does not retain residual data patterns the way magnetic platters do.
Files You Should Always Permanently Delete
Financial documents. Tax returns and bank statements and investment records and credit card statements contain enough information for identity theft. Shred these digitally when they are no longer needed rather than simply deleting them.
Medical records. Health insurance forms and prescription records and lab results are protected under HIPAA (US) and GDPR (EU). A data breach involving medical records can result in significant fines and personal harm.
Password files and credential lists. Spreadsheets or text files containing login credentials are high-value targets. Even old passwords can reveal patterns that help attackers guess current ones.
Client and customer data. Contracts and invoices and correspondence containing client information create liability if recovered from a discarded or stolen drive.
Personal photos and private correspondence. Images and messages you intended to keep private should be permanently destroyed when no longer wanted. Normal deletion leaves them accessible to anyone who gains physical access to the drive.
How to Verify That Files Are Truly Gone
After performing a secure deletion, you can verify the result by running data recovery software on the drive. Download Recuva (free) or PhotoRec (open source) and perform a deep scan of the location where the files were stored.
If the secure deletion worked correctly, the scan will return one of two results: no files found at all or fragments of random/zero data that cannot be assembled into readable files. If the scan returns intact files with recognizable names and content, the overwrite did not reach those sectors and you should run the process again.
Univik File Eraser includes verification as part of the erasure process. After overwriting, it reads back the sectors to confirm that the original data has been replaced. The completion report documents both the overwrite and the verification result, which serves as proof of destruction for compliance purposes.
Frequently Asked Questions
Does Shift+Delete permanently erase a file?
No. Shift+Delete bypasses the Recycle Bin but does not overwrite the file’s data. The file remains fully recoverable with free recovery software. Shift+Delete only removes the file reference from the directory, which is the same thing emptying the Recycle Bin does.
Can I permanently delete files on an SSD?
Yes. Although SSDs handle writes differently than HDDs due to wear leveling, a secure overwrite with Univik File Eraser combined with the SSD’s TRIM command provides effective permanent deletion. NIST guidelines confirm that a single-pass overwrite is sufficient for SSD sanitization.
How long does permanent file deletion take?
Speed depends on the file size and erasure standard. A single-pass overwrite processes data at roughly the drive’s write speed (100-500 MB/s for SSDs, 80-160 MB/s for HDDs). A 1 GB file takes about 30 seconds with a single pass or 90 seconds with the 3-pass DoD standard. Wiping free space on a 500 GB drive takes 1-4 hours depending on the method.
Is there a way to permanently delete files without installing software?
On Windows, the cipher /w: command overwrites free space after you delete files normally. On macOS, Disk Utility can erase free space on older Macs with HDDs. Both methods are slower and less targeted than dedicated erasure software because they overwrite the entire free space rather than specific files.
Should I permanently delete files before selling my computer?
Yes. Run Wipe Free Space to destroy all previously deleted files. Then run Clean System Traces to remove browser data and cached files and temporary files. Finally, perform a standard factory reset for a clean OS installation. This ensures the buyer receives a working computer with none of your recoverable data on the drive.
Conclusion
Last verified: February 2026. Secure deletion tested on Windows 11 24H2 (NTFS) and macOS Sequoia 15.3 (APFS). Verification performed with Recuva 1.53 and PhotoRec 7.2. Cipher /w tested on Windows 11. macOS Disk Utility free space erase tested on macOS Ventura (Intel Mac with HDD). SSD TRIM behavior confirmed on Samsung 990 Pro NVMe. All erasure standards tested through Univik File Eraser with post-wipe recovery scan confirmation.
Normal deletion is not permanent deletion. Every standard method (Delete key, Shift+Delete, empty Recycle Bin, quick format) leaves your files intact and recoverable on the drive. Permanent deletion requires overwriting the data itself. Univik File Eraser handles this with a right-click workflow for new files and a Wipe Free Space mode for everything you have already deleted. One operation and those files are gone permanently.
Start here: Install Univik File Eraser and run Wipe Free Space on your main drive. This single operation permanently destroys every file you have ever “deleted” through normal means. From that point forward, use the Wipe Files mode to permanently destroy sensitive files as you finish with them.