“A group of MVPs have been discussing disk wiping. Could you please provide more details of exactly how your wipe is performed and how it meets NSA/DOD standards?” Undelete 2009 uses the following DoD overwrite patterns: 1. Bit pattern #1 = Any Bit Pattern, such as ‘00110101’ 2. Bit Pattern #2 = A Bit pattern that is a Ones compliment of Bit pattern #1. For the above case, it would be ‘11001010’. 3. Bit Pattern #3 = Just a random bit pattern