Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defense and overwriting with pseudo-random data.
英
美
其他方法,包括一所界定的国家工业安全程序操作手册的美国国防部和覆盖与伪随机数据。You can also define your own overwriting methods.;您也可以定义自己的覆盖的方法。