Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?

Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!

When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there. If you were to run a recovery program you would be able to see information that you have deleted.

In order to get rid of old data you actually need to write over that same physical location on the hard drive several times to make sure it is gone, or at least much harder to recover. The standard for most government agencies is to do a seven pass wipe. That means that the hard drive will be written over with various sequences and random data seven time to be considered clean.

There are many end user applications that can assist you by wiping data as you delete it multiple times, however it will slow down your system significantly if you are deleting large amounts of data. For the average home user I wouldn't suggest wiping your deleted items more than three or four times, unless you are really worried about the information being recovered.

If you plan on wiping away the entire computer there is some applications that you can use that run from a boot diskette that will allow you to wipe the entire hard drive from start to finish. This process takes several hours, usually left as an "all nighter." (One of those programs you start before you go to sleep!)

You may be thinking, this is great for writeable media, but what about one-write media, such as CD's, DVD's and things like that? Stores sell pretty cool CD shredders, or machines that will indent the media with little holes or pock marks that make it unreadable. But my personal favorite (Do not do this, it's probably dangerous, and will be bad for the unit) is to put CD/DVD media in the microwave for two seconds. It makes the media in to this really cool spider web sort of cracked design that I like to hang on my pin board. As I mentioned, you shouldn't do this method, it's probably really bad for the microwave and might send some bad wave lengths through the room in to your brain, and it will make your microwave smell bad. You have been warned.

The final problem you might have is with hard drives that have failed, often they die at a random time, with whatever information you had on it. You don't just want to throw it in the trash, just in case someone gets creative and tries to recover the information. I highly suggest that you either disassemble it nicely with torques screw drivers (most of them use torques), and trash the plates inside, or be create in how to smash the entire drive until it's broken and flat. If you do decide to dissect it gracefully, the magnets inside are super strong and are great for hanging calendars and heavier items from metal cabinets.

Data security and privacy is such an important topic, always treat your media appropriately as to reduce your risk of passing on private information mistakenly!

Ken Dennis
http://kendennis-rss.homeip.net

expert residential cleaners Park Ridge ..
In The News:

The Omoway Omo X features a modular design, obstacle detection and emergency braking, and can drive itself to charging stations, signaling the future of smart urban mobility.
PillTrek, a tiny wireless smart capsule created by Caltech, provides real-time gut health data by detecting electrolytes, metabolites, glucose, hormones, pH levels and temperature.
Learn to spot fake bank text messages with five warning signs of Chase phishing scams, including suspicious links and urgent deadlines designed to steal your account information.
Robot coyotes built on motorized cars reaching 20 mph are being deployed at military airfields as an innovative solution to wildlife threats to aircraft safety.
Explore Google Drive's strengths and weaknesses as a backup solution, including its encryption security, privacy concerns and comparison to dedicated backup tools.
As environmental challenges grow, underwater habitats gain momentum with DEEP's Vanguard, supporting short missions and Sentinel designed for 28-day stays at depth.
The new Urban Eyes safety vest features dual cameras, reflective panels and a wireless remote to deter harassers and provide peace of mind for outdoor workouts.
The $200 billion data broker industry tracks your personal details across websites, posing privacy risks that can be mitigated through data removal services.
UCC Holding has teamed up with COBOD to create desert-inspired, 3D-printed schools in Qatar, featuring dune-like wavy walls impossible with conventional construction.
Darkling beetles equipped with microchip backpacks can be guided through disaster areas using electrical signals, offering a biological solution for search and rescue.
Scammers use number porting to take control of outdated landlines still connected to financial accounts, bypassing two-factor authentication to steal funds while avoiding detection.
Twitter co-founder Jack Dorsey developed Bitchat, a privacy-focused messaging app that works offline via Bluetooth without requiring email, phone numbers or personal data.
Google is making a push to ensure its AI, Gemini, is tightly integrated with Android systems by granting it access to core apps like WhatsApp, Messages, and Phone.
A new green energy system is set to change how we capture clean power, and it all starts with the ocean. French startup Seaturns has designed technology that taps into the natural motion of the sea.
Cybersecurity researchers are warning that hackers have started exploiting flaws in chatbots to carry out AI phishing attacks.
Google has just made it easier than ever to regain control of your inbox with Gmail's new Manage Subscriptions tool.
Despite the benefits, residential power saver programs come with several potential drawbacks and concerns that have been raised by both customers and experts.
The Blackdot AI tattoo machine is quiet. It's steady. And according to early users, it hurts a lot less.
Attackers have started to exploit the very signals that users assume will keep them safe when it comes to add-ons to improve productivity or entertainment.
Located on Cerro Pachón in Chile, the world's most powerful digital camera is set to transform how we see the universe.
The innovative DQ Tower stands 28 feet tall with 420 square feet of living space, featuring floor-to-ceiling windows and premium amenities in a prefabricated design.
A new mmWave imaging system allows warehouse robots to scan and create 3D models of objects inside sealed containers, potentially revolutionizing shipping processes.
Family fraud endangers seniors when relatives exploit their trust, but removing personal data online and monitoring identity can prevent financial harm to aging parents.
A study analyzing 500,000 customer service interactions shows chatbots struggle with complex issues while human agents excel at matching customer communication styles.
Aigen's Element robot uses solar power and AI to provide farmers with a sustainable alternative to herbicides, working efficiently in cotton and soy fields.

Basic Computer Thermodynamics

That desk in front of you and everything else around... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

15 Good Programming Habits

1. Before sitting down for coding, you must have formal... Read More

Getting Started with HTML

The basic language of the internet is html. If you... Read More

PC Tools Youd Never Think You Need

Do you use Windows standard uninstall feature? How do you... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

Get Ahead When You Build Your Own Computer

If you've been kicking around the idea of building your... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Why Using an Ad Blocker Can be a Bad Idea

Ad Blocking is getting to be a common sport on... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

An All Too Familar Pain

Lost & Found for the 21st CenturyIn today's hectic world... Read More

Internet Explorer Shortcuts for Mouse-o-phobes

If you're like me, you occasionally find the ubiquitous mouse... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Cisco Certification: Building Your Own Home Lab, Part I

CCNAs and CCNA candidates hear it all the time: ???Get... Read More

A Peek Into the Near Future of Electronics Technology

How long do you think DVDs have around? 20 years?... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

4 Computer Money-saving Tips

Tip #1 -- Rebates: A rebate is not always a... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it... Read More

How I Started Working With 3D Modeling Programs

So I'll start from the very beginning.One day I was... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More

Tips For Getting Technical Support Help Online

Sometimes your PC will start acting strange for no apparent... Read More

Virtual Memory - What is It?

I recently got an e-mail asking about virtual memory. The... Read More

green cleaning service Park Ridge ..