| Forum Home | ||||
| Press F1 | ||||
| Thread ID: 136106 | 2014-01-20 08:13:00 | Secure wipe data | Nomad (952) | Press F1 |
| Post ID | Timestamp | Content | User | ||
| 1365628 | 2014-01-21 03:19:00 | partition deleted then dban then. .format reinstall | Nomad (952) | ||
| 1365629 | 2014-01-21 04:19:00 | Just do a reinstall with full (not quick) format. | Agent_24 (57) | ||
| 1365630 | 2014-01-21 05:56:00 | already 10min left, 3 passes 2hr on this 80gb hdd was used as print machine and admin. .. | Nomad (952) | ||
| 1365631 | 2014-01-21 07:29:00 | I agree, dont reimage it, just leave it zeroed and supply a copy of install media... I have found this method effective - I mean how much time is an 80 gig drive worth? 5493 |
6ix (15746) | ||
| 1365632 | 2014-01-21 07:33:00 | reinstalling and drivers now and the SPs ... its is a MNC computer so no media :D | Nomad (952) | ||
| 1365633 | 2014-01-22 06:07:00 | Best way to securely wipe data from a hard drive : (in order) 1) Find a hammer or brick and bash the hard drive until its in many pieces. Probably the easiest and safest way. 2) Install truecrypt on a working OS.....encrypt to the highest level, then format. |
BinaryLimited (17204) | ||
| 1365634 | 2014-01-23 06:33:00 | We paid a student to mash up about 40 hard drives with a hammer - he had a blast. | 6ix (15746) | ||
| 1365635 | 2014-01-23 20:45:00 | Best way to securely wipe data from a hard drive : (in order) 1) Find a hammer or brick and bash the hard drive until its in many pieces. Probably the easiest and safest way. 2) Install truecrypt on a working OS.....encrypt to the highest level, then format. 3) Drill a few holes through them. They platter will actually shatter on some newer drives 4) throw in into the sea 5) put it in grandma's coffin just before cremation |
1101 (13337) | ||
| 1365636 | 2014-01-24 02:04:00 | Yeah, I've used DBAN in past, with Truecrypt, Not even the police could recover or access any data so it's pretty safe. Though there software "Encase" isn't the greatest in the world(in my opinion) but it is a widely used forensics software so it does show how well proper security procedures can work, keeping in mind this all happened about two years ago or more, but I don't imagine there advances will overcome proper secure deletion techniques and proper encryption techniques anytime soon. Keeping in mind, as the others said, if your doing a bit-by-bit copy, it will contain all the 0's and 1's that Identify deleted software and files so you would be destroying all the data and then replacing it again which would be quite silly. |
whiteandnerdy (17120) | ||
| 1 2 | |||||