Solved

Wiping history completely from compromised thumbdrives

Posted on 2006-07-20
6
290 Views
Last Modified: 2010-04-11
f someone has broken into your computer and you wipe the drive, do all things necessary to get rid of them but you used thumb drives on the compromised computers before, is there a way to delete/erase/wipe the history completely from the thumbdrives .  I have 4 and my daughter has one.  Totalaling about 2 gbs between all of them.  plus I have a portable 40 gb and a seagate 60 gb hardrives.  They are lexmar secure jumpdrives, centron, seagate, western digital. I would like to wipe them like I did/can the hardrives on the desktops and notebooks. Is this
possible?
0
Comment
Question by:Smcf4
  • 3
  • 2
6 Comments
 
LVL 5

Accepted Solution

by:
Dbergert earned 500 total points
ID: 17148945
0
 

Author Comment

by:Smcf4
ID: 17149126
will I still be able to use them afterwards?
0
 
LVL 5

Expert Comment

by:Dbergert
ID: 17149163
yes, you can reformat or just use them as a usb drive.

0
Enterprise Mobility and BYOD For Dummies

Like “For Dummies” books, you can read this in whatever order you choose and learn about mobility and BYOD; and how to put a competitive mobile infrastructure in place. Developed for SMBs and large enterprises alike, you will find helpful use cases, planning, and implementation.

 
LVL 5

Expert Comment

by:Dbergert
ID: 17149170
yes, you can reformat or just use them as a usb drive. -- AFTER you use SDelete or eraser on them...
0
 
LVL 4

Expert Comment

by:MalleusMaleficarum
ID: 17187480
It sounds to me like your motivation for wanting to wipe your compromised computer and your external devices and your thumbdrives is to make sure that there is no way that whatever tool/exploit was used to break into your computer could have found it's way into your other devices.

If this is the case, then a simple re-format in windows would take care of this.  So you wouldn't need another utility to do any kind of secure wiping, etc.  Formatting would remove the computer's ability to read anything on the device because as far as the computer is concerned, the device is empty.  

Also, let me make sure that when you say "wipe the drive" we are all talking about the same thing.  Typically when you talk about "wiping" to a security professional, it involves overwriting every bit of space (used and unused) on a device with either 1's, 0's, some pattern, etc.  The goal of wiping a device is to ensure that nothing that used to live on the device could ever be unerased or retrieved via conventional data recovery methods.

If you worried that information that used to be on these devices could be recovered later, then wiping is what you want.  If, however, you simply want to be able to ensure that there isn't some infected remnant of your previous breach on any of your other devices, a simple windows (or whatever OS you are using) format will suffice.

To accomplish this on an external or a thumbdrive, you can typically just right click on the device inside "My Computer" and select format.  Be sure there is nothing there you want to keep, and then let it run.  

Just a thought....
0
 

Author Comment

by:Smcf4
ID: 17196938
Yes, I want to make sure the tool/ exploit are gone.  I was under the impression a re-format only takes the information on the computer and partitions it elsewhere on the drive.  What I mean by wiping the drive,  I use a disc that I bought to write over every single thing on the drive itself.  I usually choose the one that wipes it 35 times. It sanitizes and then verifies that its been wiped.  Now, my concern comes in with the logical and physical drives.  I generally wipe the logical since it is where all the partitions are.  The physical I'm not so sure about.  

I was also under the impression that even though the computer tells you it has been formatted and that nothing remains on your system it is still recoverable with other software.  I do not want this, I want the MBR, and all drives wiped clean as if I just bought it from a store. Or it has just been built.  I do not know much about computers anything I do know I have learned through my own research.  

I could be wrong but I thought that someone could place a trojan/keylogger etc. in the boot sector or mbr of the drive and it can / will remain there until it is wiped not simply a reformat
0

Featured Post

Superior storage. Superior surveillance.

WD Purple drives are built for 24/7, always-on, high-definition security systems. With support for up to 8 hard drives and 32 cameras, WD Purple drives are optimized for surveillance.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Every computer eventually fails. When that happens, your valuable data is only as safe as your current backup.
An analysis of the phishing scam that has been affecting Google users, along with steps to take for protection, as well as what to do if you receive one of the emails.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…

864 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

23 Experts available now in Live!

Get 1:1 Help Now