How to Completely Erase a Hard Disk Drive
Transcription
How to Completely Erase a Hard Disk Drive
Issue 08 Volume 8 August 2010 How to Completely Erase a Hard Disk Drive So…you've decided to donate your old computer to a charity, local group or school. Good for you! Now here are some tips to avoid data theft when donating a computer system. It's important to make sure your computer's hard drive is completely free of data. In the "no good deed ever goes unpunished" department, you need to ensure that you don't donate more than you planned. The last thing you want is to pass on a PC with sensitive business information, or even personal information such as stored passwords, personal documents and credit card numbers that could be retrieved. There are many ways to go about ensuring your data can never be retrieved. Obviously, you can choose to physically smash the drive, but there are alternatives that enable you to keep the system intact so you can donate a complete system. Erasing and Formatting: Just Not Secure Enough Simply erasing all the data on your hard drive and formatting it is not enough security. You can spend hours going through your hard drive and deleting all the files and documents you want, but using the delete key on your keyboard in Windows basically only removes the shortcuts to the files making them invisible to users. Deleted files still reside on the hard drive and a quick Google search will show many options for system recovery software which will allow anyone to reinstate that data. Formatting the hard drive is a bit more secure than simply erasing the files. Formatting a disk does not erase the data on the disk, only the address tables. It makes it much more difficult to recover the files. However a computer specialist would be able to recover most or all the data that was on the disk before the reformat. For some businesses and individual users, a disk format may be secure enough, depending, of course, on the type of data and information saved to the computer. It is not 100 percent safe, but if you have decided a disk format is a good choice, at the very least to do a full format rather than a quick format. Disk Wiping Options (aka Data Dump) Even more secure than reformatting is a process called disk wiping. The term disk wiping is not only used in reference to hard drives but any storage device such as CDs, RAIDs, thumb drives and others. Disk wiping is a secure method of ensuring that data, including company and individually licensed software on your computer and storage devices is irrecoverably deleted before recycling or donating the equipment. Because previously stored data can be brought back with the right software and applications, the disk wiping process will actually overwrite your entire hard drive with data, several times. Once you format, you'll find it all but impossible to retrieve the data which was on the drive before the overwrite. While disk wiping algorithms differ from product to product, they all will generally write the entire disk with a number (zero or one) then a reformat will be needed. The more times the disk is overwritten and formatted the more secure the disk wipe is, but the trade-off is the extra time to perform additional rewrites. Disk wipe applications will typically overwrite the master boot record, partition table, and every sector of the hard drive. There are a variety of products available for different operating systems that you can purchase or freely download online to perform more secure disk wipes. If time to perform the disk wipe is a consideration, there are also tech security companies who offer disk wipe services. Source: www.webopedia.com, August 28, 2009 Did You Know... In 2003 two MIT students purchased 158 used disk drives from various locations and found more than 5,000 credit card numbers, medical reports, detailed personal and corporate financial information, and several gigabytes worth of personal e-mail and pornography on those drives. Wiping or erasing applications Stories of Data Passed… To be sure that your data is removed beyond all practical ability to recover it, you should use a wiping or erasing utility. These tools overwrite every sector of the hard drive with binary 1's and 0's. Those that meet government security standards even overwrite each sector multiple times for added protection. April 1997 A woman in Pahrump, NV, purchases a used IBM PC and discovers records from 2000 patients who had prescriptions filled at Smitty’s Supermarkets pharmacy in Tempe, AZ. CyberScrub cyberCide 3.0 "Delete" or "Format" doesn't mean Erase Whether your data is sent to the recycle bin or your entire drive is formatted and repartitioned, the chance of unauthorized discovery is very real and poses issues of risk and liability. Securely wipe hard drives and overwrite, delete and destroy privileged data with cyberCide. cyberCide employs advanced hard drive erasure options that will defeat software OR hardware forensic recovery. cyberCide provides a cost effective solution for the critical task of data destruction and wiping files. White Canyon WipeDrive WipeDrive has been used to erase hard drive data on over 20 million hard drives! It is approved by the Department of Defense, and it is trusted by government agencies and major corporations. Think of a video tape that is full of recorded TV shows on it. The only way to get rid of the old shows is to tape over it. Using WipeDrive is like finding a channel completely full of static and then recording over the entire tape. Using WipeDrive before getting rid of your computer will completely erase hard drive data and protect yourself from identity theft. Kroll Ontrack Eraser Software Ontrack Eraser software is an easy-to-use, highly flexible data erasure tool that erases all traces of data stored on a targeted media ensuring that sensitive information does not fall into the wrong hands. The overwriting procedures used by Ontrack Eraser to permanently remove data meet the most stringent standards for data removal; including those of the U.S. Department of Defense and the National Industrial Security Program and CESG standards in the U.K. Are there topics that you would like to have covered in future newsletters? We are always looking for topics of interest. We welcome all suggestions! To submit a topic, subscribe, or unsubscribe to our distribution list, please email Shama Renée-McIntosh at [email protected]. 11301 N. US Highway 301 ♦ Suite 106 ♦ Thonotosassa, Florida 33592 PO Box 55 ♦ Thonotosassa, Florida ♦ 33592 (Remittance Address) (813) 246-4757 (TEL) ♦ (813) 246-4576 (FAX) WWW.AASYSGROUP.COM August 2001 More than 100 computers from Viant with confidential client data sold at auction by Dovebid. Spring 2002 Pennsylvania state Department of Labor and Industry sells computers with “thousands of files of information about state employees.” August 2002 Purdue student purchased used Macintosh computer at equipment exchange; computer contains FileMaker database with names and demographic information of 100 applicants to Entomology Department. ************** In an independent study, 10 used computers were purchased from a computer store. Below are the findings: Computer #1 - File server from a law firm which still had client documents on it. Computers #2-#5 – One was a server from a law firm, one had a database of mental health patients, one still had Quicken files on it, and one had a draft manuscript of a novelist. Source: Remembrance of Data Passed: Used Disk Drives and Computer Forensics, Simson L. Garfinkel ***AaSys will be closed on Monday, September 6th in observance of Labor Day.***