Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?

Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!

When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there. If you were to run a recovery program you would be able to see information that you have deleted.

In order to get rid of old data you actually need to write over that same physical location on the hard drive several times to make sure it is gone, or at least much harder to recover. The standard for most government agencies is to do a seven pass wipe. That means that the hard drive will be written over with various sequences and random data seven time to be considered clean.

There are many end user applications that can assist you by wiping data as you delete it multiple times, however it will slow down your system significantly if you are deleting large amounts of data. For the average home user I wouldn't suggest wiping your deleted items more than three or four times, unless you are really worried about the information being recovered.

If you plan on wiping away the entire computer there is some applications that you can use that run from a boot diskette that will allow you to wipe the entire hard drive from start to finish. This process takes several hours, usually left as an "all nighter." (One of those programs you start before you go to sleep!)

You may be thinking, this is great for writeable media, but what about one-write media, such as CD's, DVD's and things like that? Stores sell pretty cool CD shredders, or machines that will indent the media with little holes or pock marks that make it unreadable. But my personal favorite (Do not do this, it's probably dangerous, and will be bad for the unit) is to put CD/DVD media in the microwave for two seconds. It makes the media in to this really cool spider web sort of cracked design that I like to hang on my pin board. As I mentioned, you shouldn't do this method, it's probably really bad for the microwave and might send some bad wave lengths through the room in to your brain, and it will make your microwave smell bad. You have been warned.

The final problem you might have is with hard drives that have failed, often they die at a random time, with whatever information you had on it. You don't just want to throw it in the trash, just in case someone gets creative and tries to recover the information. I highly suggest that you either disassemble it nicely with torques screw drivers (most of them use torques), and trash the plates inside, or be create in how to smash the entire drive until it's broken and flat. If you do decide to dissect it gracefully, the magnets inside are super strong and are great for hanging calendars and heavier items from metal cabinets.

Data security and privacy is such an important topic, always treat your media appropriately as to reduce your risk of passing on private information mistakenly!

Ken Dennis
http://kendennis-rss.homeip.net

maid service near Mundelein ..
In The News:

Foreign-owned apps secretly harvest personal data from seniors, making them prime targets for scams. Learn how to protect your privacy and stop data brokers today.
Sens. Josh Hawley and Richard Blumenthal introduce bipartisan GUARD Act to protect minors from AI chatbots through mandatory age verification and disclosure requirements.
Ghost-tapping scammers exploit wireless technology to drain accounts through small transactions, but RFID-blocking wallets and transaction alerts can protect you.
French pilot project demonstrates wireless charging roads that can deliver over 300 kilowatts of power to EVs while driving, potentially eliminating range anxiety.
YouTube's Ghost Network spreads information-stealing malware through thousands of fake videos offering cracked software, using compromised accounts and fake engagement.
Protect your privacy by disabling your smart TV microphone. Most TVs have hidden mics that listen even when voice commands are off. Learn quick steps to stop unwanted audio capture.
SessionReaper vulnerability hits Magento and Adobe Commerce stores, compromising 250+ sites in one day. Hackers steal data and hijack shopping sessions.
Master essential parental controls and digital safety tools to protect your kids online. Learn screen time limits, location settings and privacy controls every parent needs.
Cybersecurity expert shares six essential steps to protect against dark web threats, including data removal services, password managers and antivirus software.
NVIDIA GPU space mission could revolutionize cloud services by enabling orbital data centers that make apps, games and AI tools faster and more efficient.
Stay up to date on the latest AI technology advancements and learn about the challenges and opportunities AI presents now and for the future.
Microsoft warns Windows 10 users face serious security risks as 90% of ransomware attacks target unsupported systems. Learn why upgrading to Windows 11 is crucial.
Nike unveils Project Amplify, revolutionary motorized shoes developed with Dephy that add powered assistance to every step for runners and walkers.
Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.

Lives With Games Tradition and Industry

The United States Of America citizen feels that games is... Read More

Are You Well Protected?

Winter?the official start of the cold and flu season. Though,... Read More

FTP - File Transfer Protocol Explained

File Transfer Protocol (FTP) is a protocol that is part... Read More

Why Using an Ad Blocker Can be a Bad Idea

Ad Blocking is getting to be a common sport on... Read More

Buying a Home Theater Receiver

Buying a receiver is one of the most important decisions... Read More

This Page Cannot Be Displayed ? What to Do When Your Internet Breaks

The DNS (Domain Name System) servers are what your computer... Read More

SOBIG.F Virus Promises Ill Be Back

On 21 August 2003 Symantec Security Response upgraded the W32.SOBIG.F... Read More

Consumer Electronic Information: The Basics of the DLP Projector

Projectors have come a long way in the past few... Read More

What are the Main Components of Any Computer, and Which are the Most Critical to Its Performance?

Computers are everywhere, and vary in specification, brands, sizes, shaped,... Read More

Put Order and Information into File Names

Unless you place your faith in internal search engine software... Read More

Back Up, Back Up, Back Up!

This is not your typical lost data story. I was... Read More

The Best MP3 Players Under $100

You don't have to fork out $250 for a super-diggy-whizbang... Read More

Wordpress Plugins

Maybe you always wanted a feature that hasn't been available... Read More

Tips for Buying a PC

Buying Your PCBuying a PC that's right for you and... Read More

10 Easy Steps to Speed Up Your Computer - Without Upgrading

1. Empty the Temp directory regularly. To do this, make... Read More

Taking Advantage of the iPod Experience

Music lovers have been carrying around radios and other bulky... Read More

10 Tips to SPEED Up Your PC

1. Let your PC boot up completely before opening any... Read More

Cisco CCNA / CCNP Certification: OSPF ASBRs Explained And Illustrated

When I first started studying for my CCNP, some of... Read More

Top 9 Ways To Speed Up Your Surfing & Computing

It seems like fast never quite rates fast enough.No matter... Read More

Cisco CCNA Candidate FAQ

CCNA FAQQ. What exams do I have to take to... Read More

Make Windows XP Run Faster!

A friend told me: "My computer startup seems to be... Read More

Computer Geeks and Garden Gnomes

First and foremost before I begin my ranting it is... Read More

Home Video? Bring it On

So you got yourself a digital camcorder. If you want... Read More

The Benefits of Open Source

If you are a building a website or a forum,... Read More

Home Electronics: The Facts About Plasma TV

Not so many years ago, homes across the country watched... Read More

high-end home cleaning Bannockburn ..