Solved

erasing data beyond recovery

Posted on 2006-11-17
3
212 Views
Last Modified: 2013-12-04
do these products like CyberScrub, Cybercide, and Evidence Eliminator that claim to erase data beyond software or hardware recovery actually work?

Or, if sensitive data got on the hard drive, is it recoverable no matter what process was used to erase or destroy it?

Also, please tell me if you have specific experience in data recovery.  Thanks.
0
Comment
Question by:kitesurferdude
3 Comments
 
LVL 9

Expert Comment

by:JamesTX10
ID: 17969090
Hi kitesurferdude,
http://www.killdisk.com/ Is a popular tool for cleaning discs.

JamesTX10
0
 
LVL 27

Accepted Solution

by:
David-Howard earned 500 total points
ID: 17969322
I know that departments such as the FBI and the CIA have utilities that can recover virtually any data, no matter how it was altered on the drive, disk, etc.
You can download a utility here that makes 35 passes on the hard drive. This will effectively erase the drive for most recovery utilities.
http://www.linux-kurser.dk/secure_harddisk_eraser.html
Some time ago I worked for the US Navy in a communications facility. They did not rely on utilities in emergency crisis. They physically destroyed the platters of the hard drive or melted them with heat or chemicals.
This is mentioned as well in the above link.
David
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17987529
Closed.

I agree with last two comments.
0

Featured Post

The Eight Noble Truths of Backup and Recovery

How can IT departments tackle the challenges of a Big Data world? This white paper provides a roadmap to success and helps companies ensure that all their data is safe and secure, no matter if it resides on-premise with physical or virtual machines or in the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Host Profile issue on Esxi 5.5 U3a 6 545
bypass UAC - always notifiy 4 67
Server 2008-R2 lost password 19 99
PCI scan - CIFS NULL Session Permitted 10 103
The term "Bad USB" is a buzz word that is usually used when talking about attacks on computer systems that involve USB devices. In this article, I will show what possibilities modern windows systems (win8.x and win10) offer to fight these attacks wi…
No security measures warrant 100% as a "silver bullet". The truth is we also cannot assume anything but a defensive and vigilance posture. Adopt no trust by default and reveal in assumption. Only assume anonymity or invisibility in the reverse. Safe…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question