Disk wiping for security purposes almost certainly needs to interact with the disk on lower level than merely writing large files. As an example, the claimed "Mil-Spec security" provided by one vendor involved writing each of a set of byte patterns, in a particular order, to each sector of the disk. Multiple times, I think.
As with many other security considerations, what needs to be done will depend also on the tenacity and resources of the adversary. It's one thing to make sure somebody can't reconstruct a particular file using Norton Utilities, and another to keep the NSA from reading the disk by using data remnants from seeker head hysteresis.
But God demonstrates His own love toward us, in that while we were yet sinners, Christ died for us. Romans 5:8 (NASB)