Posted on 11/03/2005 4:43:16 PM PST by neverdem
Maintaining privacy in the era of digital information requires work on a number of fronts, whether fending off spyware, protecting important files with encryption or configuring a Wi-Fi hot spot to keep interlopers off a wireless network.
One basic privacy measure, however, is easily overlooked: proper data destruction.
Deleting confidential data completely is essential when donating or selling old computers, and it can also help maintain privacy on computers that may end up lost or stolen. And for businesses looking for ways to comply with the security requirements of laws like the Sarbanes-Oxley Act, a sound policy on data control and destruction is crucial.
When normal deletion methods like the Recycle Bin or the delete command are used, the computer's operating system, for the sake of speed, creates an illusion that data has been deleted. In fact, it merely earmarks that region of a disk or drive as being available for new data to overwrite the old data. Until that overwriting occurs, the old data can be retrieved with undelete programs and tools used by data recovery labs and law enforcement agencies.
There are, however, several options for securely eliminating data from hard disks, U.S.B. flash drives and other storage media. These programs overwrite data with meaningless characters to render it unrecoverable with today's data recovery techniques. Some of the programs can overwrite entire drives...
--snip--
For example, Darik's Boot and Nuke, known also as DBAN, is a free open-source program available at dban.sourceforge.net. It runs on Windows computers and offers six methods to overwrite data, including a Defense Department standard (DoD 5220.22-M) that can overwrite the disk three times, as well as a method called PRNG Stream Wipe, which can make a user-defined number of disk overwrites using randomly generated characters.
(Excerpt) Read more at nytimes.com ...
Try this (from the Word Help file):
Open an earlier version of a document
On the File menu, click Versions.
Click the version of the document you want to open.
Click Open.
This version contains all the previously saved versions.
If that doesn't work, go to Microsoft's website; on the left hand side click "communities", then forums,office, Word,General. You can search or you can post the question there. You can pretty much be guaranteed to get an answer that will work.
Random generated patterns overwriting free space (multiple times) is a good option.
Still, US GOV; DOD, Spook central Tempest specifications require the complete physical destruction of the data medium when its retired. Even media that's NEVER been used!
Yes, but open source programs can and still do employ such processes. Why? Cause they're imported from outside the US by-passing US laws.
G=C800:5
might do the job.
Got any geeks out there?
Trade in value? My Osborne is a collector's item. The others I use until they are ready for the landfill. If you don't upgrade software, you don't have to upgrade hardware.
You might want to try TweakNow RegCleaner. It's free and seems to pick up stuff other programs miss.
Thanks I'll try it.
This (#20) might be useful...
Not as good as the multiple random overwrites. Formating writes the same thing every time. Theoretically it could still leave a faint trace of the original information. (VERY theoretically, and unless it's the government, or another government, you are trying to hide the data from, the reformatting is probably good enough).
Take out the platters, use a really, really strong magnet on them, and then make wind chimes out of them.
I'm taking my old computer to the farm to target practice. Then I am going to burn,melt it in the deer hunting pit fire. What is left when cool will be buried.
Bastards!
And they wonder why they're loosing profits.
Thanks for the ping!
Ping
See #22
I didn't see anybody mention Webroot's "Window Washer" - - do you know anything about that program? I use it but I have no idea what it actually does.
No, because residual magnetic images can still be picked up, even after 7 times. However, not many agencies in the world are able to recover data that thouroughly deleted, if you get my drift. For "normal" users, a DOD standard erase is usually OK, but to be absolutely, positivly sure, you need to erase the drive to DOD standards, then put it through a metal shredder. I'm NOT kidding. That's a requirement at some government installations.
Mark
Absolutely NOT! Using DOS or Windows to "format" a drive does NOT erase the data, and it's easily recovered. Using a "low level format" multiple times might (depending on the utility... It may actually only delete the MBR and partition table, and just verify the rest of the drive, leaving the data in tact) overwrite the data with the same characters over and over again, so forensic recovery hardware and software will still be able to recover most, if not all of the data.
In order to conform to DOD standards, random data must overwrite each byte a minimum (I believe) of 7 times. Then it becomes extremely difficult to recover the data.
Mark
*
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.