Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

Wiping history completely from compromised thumbdrives

Posted on 2006-07-20
6
Medium Priority
?
306 Views
Last Modified: 2010-04-11
f someone has broken into your computer and you wipe the drive, do all things necessary to get rid of them but you used thumb drives on the compromised computers before, is there a way to delete/erase/wipe the history completely from the thumbdrives .  I have 4 and my daughter has one.  Totalaling about 2 gbs between all of them.  plus I have a portable 40 gb and a seagate 60 gb hardrives.  They are lexmar secure jumpdrives, centron, seagate, western digital. I would like to wipe them like I did/can the hardrives on the desktops and notebooks. Is this
possible?
0
Comment
Question by:Smcf4
  • 3
  • 2
6 Comments
 
LVL 5

Accepted Solution

by:
Dbergert earned 2000 total points
ID: 17148945
0
 

Author Comment

by:Smcf4
ID: 17149126
will I still be able to use them afterwards?
0
 
LVL 5

Expert Comment

by:Dbergert
ID: 17149163
yes, you can reformat or just use them as a usb drive.

0
Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

 
LVL 5

Expert Comment

by:Dbergert
ID: 17149170
yes, you can reformat or just use them as a usb drive. -- AFTER you use SDelete or eraser on them...
0
 
LVL 4

Expert Comment

by:MalleusMaleficarum
ID: 17187480
It sounds to me like your motivation for wanting to wipe your compromised computer and your external devices and your thumbdrives is to make sure that there is no way that whatever tool/exploit was used to break into your computer could have found it's way into your other devices.

If this is the case, then a simple re-format in windows would take care of this.  So you wouldn't need another utility to do any kind of secure wiping, etc.  Formatting would remove the computer's ability to read anything on the device because as far as the computer is concerned, the device is empty.  

Also, let me make sure that when you say "wipe the drive" we are all talking about the same thing.  Typically when you talk about "wiping" to a security professional, it involves overwriting every bit of space (used and unused) on a device with either 1's, 0's, some pattern, etc.  The goal of wiping a device is to ensure that nothing that used to live on the device could ever be unerased or retrieved via conventional data recovery methods.

If you worried that information that used to be on these devices could be recovered later, then wiping is what you want.  If, however, you simply want to be able to ensure that there isn't some infected remnant of your previous breach on any of your other devices, a simple windows (or whatever OS you are using) format will suffice.

To accomplish this on an external or a thumbdrive, you can typically just right click on the device inside "My Computer" and select format.  Be sure there is nothing there you want to keep, and then let it run.  

Just a thought....
0
 

Author Comment

by:Smcf4
ID: 17196938
Yes, I want to make sure the tool/ exploit are gone.  I was under the impression a re-format only takes the information on the computer and partitions it elsewhere on the drive.  What I mean by wiping the drive,  I use a disc that I bought to write over every single thing on the drive itself.  I usually choose the one that wipes it 35 times. It sanitizes and then verifies that its been wiped.  Now, my concern comes in with the logical and physical drives.  I generally wipe the logical since it is where all the partitions are.  The physical I'm not so sure about.  

I was also under the impression that even though the computer tells you it has been formatted and that nothing remains on your system it is still recoverable with other software.  I do not want this, I want the MBR, and all drives wiped clean as if I just bought it from a store. Or it has just been built.  I do not know much about computers anything I do know I have learned through my own research.  

I could be wrong but I thought that someone could place a trojan/keylogger etc. in the boot sector or mbr of the drive and it can / will remain there until it is wiped not simply a reformat
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Ransomware, the malware that locks down its victim’s files until they pay up, has always been a frustrating issue to deal with. However, a recent mobile ransomware will make the issue a little more personal… by sharing the victim’s mobile browsing h…
What monsters are hiding in your child's room? In this article I will share with you a tech horror story that could happen to anyone, along with some tips on how you can prevent it from happening to you.
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
In a question here at Experts Exchange (https://www.experts-exchange.com/questions/29062564/Adobe-acrobat-reader-DC.html), a member asked how to create a signature in Adobe Acrobat Reader DC (the free Reader product, not the paid, full Acrobat produ…

972 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question