?
Solved

erasing data beyond recovery

Posted on 2006-11-17
3
Medium Priority
?
217 Views
Last Modified: 2013-12-04
do these products like CyberScrub, Cybercide, and Evidence Eliminator that claim to erase data beyond software or hardware recovery actually work?

Or, if sensitive data got on the hard drive, is it recoverable no matter what process was used to erase or destroy it?

Also, please tell me if you have specific experience in data recovery.  Thanks.
0
Comment
Question by:kitesurferdude
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 9

Expert Comment

by:JamesTX10
ID: 17969090
Hi kitesurferdude,
http://www.killdisk.com/ Is a popular tool for cleaning discs.

JamesTX10
0
 
LVL 27

Accepted Solution

by:
David-Howard earned 1500 total points
ID: 17969322
I know that departments such as the FBI and the CIA have utilities that can recover virtually any data, no matter how it was altered on the drive, disk, etc.
You can download a utility here that makes 35 passes on the hard drive. This will effectively erase the drive for most recovery utilities.
http://www.linux-kurser.dk/secure_harddisk_eraser.html
Some time ago I worked for the US Navy in a communications facility. They did not rely on utilities in emergency crisis. They physically destroyed the platters of the hard drive or melted them with heat or chemicals.
This is mentioned as well in the above link.
David
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17987529
Closed.

I agree with last two comments.
0

Featured Post

WatchGuard's M Series Appliances - Miecom Approved

WatchGuard's newest M series appliances were put to the test by Miercom.  We had great results and outperformed all of our competitors in both stateless and stateful traffic throghput scenarios! Ready to see how your UTM appliance stacked up? Download the Miercom Report!

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In a recent article here at Experts Exchange (http://www.experts-exchange.com/articles/18880/PaperPort-14-in-Windows-10-A-First-Look.html), I discussed my nine-month sandbox testing of the Windows 10 Technical Preview, specifically with respect to r…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
In this video you will find out how to export Office 365 mailboxes using the built in eDiscovery tool. Bear in mind that although this method might be useful in some cases, using PST files as Office 365 backup is troublesome in a long run (more on t…
Suggested Courses
Course of the Month8 days, 7 hours left to enroll

764 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question