Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?

Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!

When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there. If you were to run a recovery program you would be able to see information that you have deleted.

In order to get rid of old data you actually need to write over that same physical location on the hard drive several times to make sure it is gone, or at least much harder to recover. The standard for most government agencies is to do a seven pass wipe. That means that the hard drive will be written over with various sequences and random data seven time to be considered clean.

There are many end user applications that can assist you by wiping data as you delete it multiple times, however it will slow down your system significantly if you are deleting large amounts of data. For the average home user I wouldn't suggest wiping your deleted items more than three or four times, unless you are really worried about the information being recovered.

If you plan on wiping away the entire computer there is some applications that you can use that run from a boot diskette that will allow you to wipe the entire hard drive from start to finish. This process takes several hours, usually left as an "all nighter." (One of those programs you start before you go to sleep!)

You may be thinking, this is great for writeable media, but what about one-write media, such as CD's, DVD's and things like that? Stores sell pretty cool CD shredders, or machines that will indent the media with little holes or pock marks that make it unreadable. But my personal favorite (Do not do this, it's probably dangerous, and will be bad for the unit) is to put CD/DVD media in the microwave for two seconds. It makes the media in to this really cool spider web sort of cracked design that I like to hang on my pin board. As I mentioned, you shouldn't do this method, it's probably really bad for the microwave and might send some bad wave lengths through the room in to your brain, and it will make your microwave smell bad. You have been warned.

The final problem you might have is with hard drives that have failed, often they die at a random time, with whatever information you had on it. You don't just want to throw it in the trash, just in case someone gets creative and tries to recover the information. I highly suggest that you either disassemble it nicely with torques screw drivers (most of them use torques), and trash the plates inside, or be create in how to smash the entire drive until it's broken and flat. If you do decide to dissect it gracefully, the magnets inside are super strong and are great for hanging calendars and heavier items from metal cabinets.

Data security and privacy is such an important topic, always treat your media appropriately as to reduce your risk of passing on private information mistakenly!

Ken Dennis
http://kendennis-rss.homeip.net

residential cleaning services Lincolnshire ..
In The News:

Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.
New Instagram parental controls allow families to manage teen screen time and content limits through the Family Center with stricter safety settings.
Third-party security breach at Discord exposes sensitive user information including government IDs, highlighting cybersecurity risks from external service providers.
Survey of 1,000 students shows teens using AI for personal relationships while two-thirds of parents remain unaware of their children's AI usage.
Cybersecurity experts warn about a ShadowLeak vulnerability that weaponized ChatGPT's Deep Research agent to steal personal data from Gmail accounts through hidden commands.
Tesla's Full Self-Driving system faces federal investigation following 58 reports of crashes, with six vehicles running red lights before colliding with other cars.
The Fox News AI Newsletter brings you the latest developments on artificial intelligence, with news on OpenAI moving to soon allow erotica for adult users.
Eric Schmidt alerts that hackers can reverse-engineer AI models to bypass safety measures, citing examples like the jailbroken ChatGPT variant called DAN.
Cybercriminals exploit Microsoft Teams through impersonation, malicious links and fake profiles to gather intel and deliver ransomware to personal and work devices.
Google, Dior, Allianz and dozens of other companies lost sensitive customer data in Salesforce-related breaches affecting millions of records across multiple sectors.
Apple launches iOS 26 with new Preview app that combines document editing, PDF annotation and scanning features into one streamlined iPhone experience.
New AI road monitoring system uses sensor-embedded fabric to predict infrastructure problems, potentially reducing maintenance costs and traffic disruptions for cities.
Holiday charity scams target retirees through lookalike organization names, untraceable payment requests, and data broker information to steal donations.
The Federal Trade Commission says criminals are posing as IRS agents, law enforcement officers or other officials, often over the phone or online, to steal thousands of dollars at a time.
AI phishing scams now use voice cloning and deepfake technology to trick victims, but Kurt "CyberGuy" Knutsson reveals warning signs to watch for.
Inversion Space unveils Arc, a reusable reentry vehicle that can deliver up to 500 pounds of cargo from orbit to anywhere on Earth in under an hour.
Red flags like processing fees, urgent countdowns and requests for full Social Security numbers expose fraudulent settlement sites targeting consumers.
Comprehensive analysis of Google Maps, Waze and Apple Maps examines usability, routing accuracy, data handling and features across the top navigation platforms.
Expert analysis reveals whether wired Ethernet or wireless Wi-Fi connections are safer for home internet use, plus practical steps to secure your network from attackers.
Australian construction robot Charlotte uses sand, crushed brick and recycled glass to 3D print fireproof, floodproof homes with reduced carbon footprint.

Buying A PC Flat Screen Monitor

For six years, my Samsung PC 13.8 inch SyncMaster conventional... Read More

Spyware Remover

Your first step in removing dangerous infections from your computer... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

Simple Overview Of Computer

Computer is an electronic machine work on the instructions of... Read More

How To Search Your PC With Google Desktop

In this era of Internet, most people are frequent users... Read More

How to Set Up Simple File Sharing WinXP

The first step is: Start > My DocumentsSo you have... Read More

Can Movie Theatres Compete with Home HD TV in the Future?

The battle is heating up for market share, home movie... Read More

The Advantages of Portable MP3 Players

With their solid-state technology, compact size, and abundant memory, portable... Read More

How To Safeguard Your Computer?

The following practice, if done regularly, may help you to... Read More

Computer Viruses are Bad Luck

OK, so you caught a computer virus and your system... Read More

Cisco Certification: Building Your Home Lab, Part II

In the first part of this home lab tutorial, CCNA... Read More

If You are the Only User on Your Windows XP Computer, Do You Think One User Account Is Enough?

I am going to assume that you are running windows... Read More

Getting Started with HTML

The basic language of the internet is html. If you... Read More

Seven Things to Consider When Choosing a PDA

In the early days, Personal Digital Assistants (PDAs) were not... Read More

Smart Apple iPod Tips and Techniques

Are you thinking of buying an Apple iPod? Or have... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

The Help Desk

When you think of a help desk, what do you... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Flash Memory, Part I: MMC and SD

MMC and SDFlash memory is available in so many formats... Read More

Gain Control Over Your Screensavers With These Simple Steps

We all enjoy our favorite screensavers but in the same... Read More

Cisco Certification: A Survival Guide To The Cisco Cable Jungle

One of the most confusing parts of beginning your Cisco... Read More

Desktop Security Software Risks - Part 2

This is the third in a series of articles highlighting... Read More

Choosing a Portable MP3 Player: Part 1

MP3 players are everywhere! It seems that the number of... Read More

Troubleshooting Computer Freeze (Lockup) Problems

How familiar does the following sound? Your computer was working... Read More

Uninstall Windows Media Player 10 and Start Enjoying Your Media Again

Windows Media Player 10 has been full of bugs from... Read More

best cleaning company Highland Park ..