Solved

sensitive data in recycle bin

Posted on 2006-11-17
2
209 Views
Last Modified: 2013-12-04
If I deleted sensitive data from a second local hard drive and the deletion put the sensitive data in my Recycle Bin, does that mean that it copied the sensitive data onto my C drive?
0
Comment
Question by:kitesurferdude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
JamesTX10 earned 250 total points
ID: 17969017
Hi kitesurferdude,
Most drives have storage on them for the recycle bin.

Right click on the recycle bin and select properties.
If there are settings for your second drive then no it did not copy them to the C: drive

JamesTX10
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17969730
Never permit recycle bin, what is needed is rarely there, and it is a place for getting overconfident while being a place for malware to hide.

> does that mean that it copied the sensitive data onto my C drive?

Probably and more than likely. go take a look yourself. Sensitve data especially should be removed, not just marked as deleted.
0

Featured Post

Independent Software Vendors: We Want Your Opinion

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
antivirus on mac 8 84
Password reset 1 54
Behavior-based and anomalies detection for Symantec 2 44
Mode / vector of infections and attacks 3 39
As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste‚Ķ
SHARE your personal details only on a NEED to basis. Take CHARGE and SECURE your IDENTITY. How do I then PROTECT myself and stay in charge of my own Personal details (and) - MY own WAY...
This video shows how to use Hyena, from SystemTools Software, to update 100 user accounts from an external text file. View in 1080p for best video quality.

737 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question