?
Solved

sensitive data in recycle bin

Posted on 2006-11-17
2
Medium Priority
?
216 Views
Last Modified: 2013-12-04
If I deleted sensitive data from a second local hard drive and the deletion put the sensitive data in my Recycle Bin, does that mean that it copied the sensitive data onto my C drive?
0
Comment
Question by:kitesurferdude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
JamesTX10 earned 750 total points
ID: 17969017
Hi kitesurferdude,
Most drives have storage on them for the recycle bin.

Right click on the recycle bin and select properties.
If there are settings for your second drive then no it did not copy them to the C: drive

JamesTX10
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17969730
Never permit recycle bin, what is needed is rarely there, and it is a place for getting overconfident while being a place for malware to hide.

> does that mean that it copied the sensitive data onto my C drive?

Probably and more than likely. go take a look yourself. Sensitve data especially should be removed, not just marked as deleted.
0

Featured Post

Bringing Advanced Authentication to the SMB Market

WatchGuard announces the acquisition of advanced authentication provider, Datablink, with one mission – to bring secure authentication to SMB, mid-market, and distributed enterprises with a cloud-based solution, ideal for resale via their established channel & MSSP community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Many of us in IT utilize a combination of roaming profiles and folder redirection to ensure user information carries over from one workstation to another; in my environment, it was to enable virtualization without needing a separate desktop for each…
Our Group Policy work started with Small Business Server in 2000. Microsoft gave us an excellent OU and GPO model in subsequent SBS editions that utilized WMI filters, OU linking, and VBS scripts. These are some of experiences plus our spending a lo…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
In this video, Percona Solution Engineer Dimitri Vanoverbeke discusses why you want to use at least three nodes in a database cluster. To discuss how Percona Consulting can help with your design and architecture needs for your database and infras…
Suggested Courses
Course of the Month13 days, 13 hours left to enroll

800 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question