Solved

DSX 1.38

Posted on 2004-03-24
2
186 Views
Last Modified: 2010-04-11
I was wondering what is the best data overwrite software,something DSX 1.38.
Do you know where I can get a dos software to destroy data permantly. I want to do a clean install for a aol  computere and I want to be sure that ther are no hard disk problems by destroying everything. Can you help me please.
0
Comment
Question by:The_Rhazza
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 6

Accepted Solution

by:
akboss earned 25 total points
ID: 10671025
0
 
LVL 18

Expert Comment

by:chicagoan
ID: 10686821
or the manufacturer's destructive disk test utility (Maxtor, WD, etc.)
For killdisk you'll want a CLEAN DOS/98 boofdisk (made on a KNOWN clean machine)
www.bootdisk.com

>DSX 1.38
What does that refer to?
0

Featured Post

What Is Transaction Monitoring and who needs it?

Synthetic Transaction Monitoring that you need for the day to day, which ensures your business website keeps running optimally, and that there is no downtime to impact your customer experience.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ready for our next Course of the Month? Here's what's on tap for June.
Recovering from what the press called "the largest-ever cyber-attack", IT departments worldwide are discussing ways to defend against this in the future. In this process, many people are looking for immediate actions while, instead, they need to tho…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

717 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question