Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?

Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!

When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there. If you were to run a recovery program you would be able to see information that you have deleted.

In order to get rid of old data you actually need to write over that same physical location on the hard drive several times to make sure it is gone, or at least much harder to recover. The standard for most government agencies is to do a seven pass wipe. That means that the hard drive will be written over with various sequences and random data seven time to be considered clean.

There are many end user applications that can assist you by wiping data as you delete it multiple times, however it will slow down your system significantly if you are deleting large amounts of data. For the average home user I wouldn't suggest wiping your deleted items more than three or four times, unless you are really worried about the information being recovered.

If you plan on wiping away the entire computer there is some applications that you can use that run from a boot diskette that will allow you to wipe the entire hard drive from start to finish. This process takes several hours, usually left as an "all nighter." (One of those programs you start before you go to sleep!)

You may be thinking, this is great for writeable media, but what about one-write media, such as CD's, DVD's and things like that? Stores sell pretty cool CD shredders, or machines that will indent the media with little holes or pock marks that make it unreadable. But my personal favorite (Do not do this, it's probably dangerous, and will be bad for the unit) is to put CD/DVD media in the microwave for two seconds. It makes the media in to this really cool spider web sort of cracked design that I like to hang on my pin board. As I mentioned, you shouldn't do this method, it's probably really bad for the microwave and might send some bad wave lengths through the room in to your brain, and it will make your microwave smell bad. You have been warned.

The final problem you might have is with hard drives that have failed, often they die at a random time, with whatever information you had on it. You don't just want to throw it in the trash, just in case someone gets creative and tries to recover the information. I highly suggest that you either disassemble it nicely with torques screw drivers (most of them use torques), and trash the plates inside, or be create in how to smash the entire drive until it's broken and flat. If you do decide to dissect it gracefully, the magnets inside are super strong and are great for hanging calendars and heavier items from metal cabinets.

Data security and privacy is such an important topic, always treat your media appropriately as to reduce your risk of passing on private information mistakenly!

Ken Dennis
http://kendennis-rss.homeip.net

tidy up service Northbrook ..
In The News:

Mac malware campaign uses fake AI chat results to deliver AMOS through terminal commands, security researchers report. Attackers exploit trust in AI-generated cleanup guides.
States require AI disclosure in healthcare as California, Colorado and Utah implement laws mandating transparency when artificial intelligence influences patient care decisions.
ETA sharing on Apple Maps and Google Maps keeps contacts updated automatically while you drive safely. Learn step-by-step instructions for iPhone and Android.
Data removal from brokers protects against AI-powered scams and deepfake threats in 2026. Learn how data brokers sell your personal information to scammers.
Learn how to act against cybercriminals in 2026 with essential security steps like two-factor authentication, software updates and credit freezing.
Choose between OpenAI releasing Sora text-to-video model, the AI race heating up, or Waymo driverless cars launching in cities across the country
Learn how to set up Google Maps and Apple Maps on your phone to automatically remember where you parked. Step-by-step instructions for enabling location services and parking detection.
Phishing scammers use rnicrosoft.com domain to impersonate Microsoft by replacing "m" with "rn" in typosquatting attacks that steal login credentials.
OpenAI announces new teen safety rules for ChatGPT users under 18, blocking romantic roleplay and requiring extra caution on body image topics.
A 2025 data breach at fintech company 700Credit exposes personal information of more than 5.8 million people through compromised third-party integration partner.
Retailers lose $76.5 billion annually to return fraud as nearly 10% of U.S. retail returns involve fraudulent activity, with $850 billion in returns expected in 2025.
ShinyHunters claims responsibility for stealing 94GB of Pornhub user data affecting over 200 million records and demands Bitcoin ransom.
ChatGPT 2025 now connects to Apple Music, Canva, Expedia, TripAdvisor and OpenTable through built-in apps that help users create playlists, design graphics and more.
Apple releases emergency patches for two zero-day vulnerabilities actively exploited in attacks. iPhone and iPad users urged to update immediately.
DoorDash launches Zesty, an AI-powered social app that recommends restaurants through conversational search, now testing in San Francisco and New York.
Cybersecurity firm Infoblox reveals that over 90 percent of parked domains now redirect visitors to scams and malware, making simple typos extremely dangerous.
The Fox News AI Newsletter covers the latest artificial intelligence technology advancements, including the challenges and opportunities AI presents now and for the future.
GPT-5.2 is now live for all ChatGPT users with improved coding, writing and image interpretation, with Kurt Knutsson offering his review.
New iPhone replacement scam uses pressure tactics and fake carrier calls to steal devices from buyers. Criminals claim shipping errors and demand urgent returns.
Amazon Ring's new facial recognition feature sparks privacy controversy as Electronic Frontier Foundation critics argue the AI upgrade expands surveillance risks.
New Android banking trojan Sturnus steals credentials, reads encrypted messages and controls devices.
Denmark's 3D-printed student village proves automation builds 36 apartments faster than traditional methods. Skovsporet project shows housing future.
Discover Android's new Sound Notifications feature that alerts you to smoke alarms, doorbells, and baby cries even when wearing headphones.
New SantaStealer malware reportedly threatens holiday shoppers with password theft. This Christmas-themed info-stealer targets browsers and crypto wallets.
The Christmas season brings a surge in Netflix phishing scams targeting shoppers with fake emails. Stacey P received convincing scam but verified account first.

Image Conversion In Computers

JPEG, GIFF/JIFF, BMP, and TIFF are the most commonly used... Read More

Help, I Need a New HDTV! (Part 2 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Your Home is in Your Hands

I would like to tell you about a magic home.... Read More

Nephrology and Dialysis For a PDA

Saving Lives With A Pocket PCFree medical downloads can be... Read More

USB Drives - What to Look For in a USB Device

Those small USB drives have so many names, pocket drives,... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

Dont Let the Internet Overstimulate Your Mind

The Internet is an awesome tool, but be careful and... Read More

The Ipod Mini: Why Its Not that Hot

I got my eyes set on a iPod mini, as... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

Is DVD Storage An Attractive Alternative For Your Computer Backup?

If you have a computer for home use or for... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

How to Buy a Plasma Television Set

Most people think that all you have to do to... Read More

Flash Your nVidia Video Cards BIOS

You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More

Basic Computer Maintenance

One of the most common questions computer users ask is,... Read More

Digital Cameras: Hot Gear with the Coolest Features!

Cameras: still known for taking pictures but assumed as digital... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

How To Recognize The Telltale Signs Of Spyware

Spyware is the software that collects information about your online... Read More

Setting File Permissions On A Unix Server

File permissions are one of the strengths that the Unix... Read More

Basic Problem in a PC

I have a p3 500MHz PC with 128MB RAM, 10.2... Read More

Build Your Own Computer

I'm eighty-one years old and I bought my first computer... Read More

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting... Read More

Basic Computer Thermodynamics

That desk in front of you and everything else around... Read More

How To Increase Computer Speed And Performance - Great Tips & Tricks

Many computer users are worried about their computer's performance. After... Read More

Mail-merging: The Principles

About mail-mergingMail-merging is the process of merging variable data and... Read More

reliable home cleaners Buffalo Grove ..