Solved

erasing data beyond recovery

Posted on 2006-11-17
3
210 Views
Last Modified: 2013-12-04
do these products like CyberScrub, Cybercide, and Evidence Eliminator that claim to erase data beyond software or hardware recovery actually work?

Or, if sensitive data got on the hard drive, is it recoverable no matter what process was used to erase or destroy it?

Also, please tell me if you have specific experience in data recovery.  Thanks.
0
Comment
Question by:kitesurferdude
3 Comments
 
LVL 9

Expert Comment

by:JamesTX10
ID: 17969090
Hi kitesurferdude,
http://www.killdisk.com/ Is a popular tool for cleaning discs.

JamesTX10
0
 
LVL 27

Accepted Solution

by:
David-Howard earned 500 total points
ID: 17969322
I know that departments such as the FBI and the CIA have utilities that can recover virtually any data, no matter how it was altered on the drive, disk, etc.
You can download a utility here that makes 35 passes on the hard drive. This will effectively erase the drive for most recovery utilities.
http://www.linux-kurser.dk/secure_harddisk_eraser.html
Some time ago I worked for the US Navy in a communications facility. They did not rely on utilities in emergency crisis. They physically destroyed the platters of the hard drive or melted them with heat or chemicals.
This is mentioned as well in the above link.
David
0
 
LVL 24

Expert Comment

by:SunBow
ID: 17987529
Closed.

I agree with last two comments.
0

Featured Post

Complete Microsoft Windows PC® & Mac Backup

Backup and recovery solutions to protect all your PCs & Mac– on-premises or in remote locations. Acronis backs up entire PC or Mac with patented reliable disk imaging technology and you will be able to restore workstations to a new, dissimilar hardware in minutes.

Join & Write a Comment

As I write this article, I am finishing cleanup from the Qakbot virus variant found in the wild on April 18, 2011.  It was a messy beast that had varying levels of infection, speculated as being dependent on how long it resided on the infected syste…
Article by: btan
The intent is not to repeat what many has know about Ransomware but more to join its dots of what is it, who are the victims, why it exists, when and how we respond on infection. Lastly, sum up in a glance to share such information with more to help…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, Just open a new email message.  In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…

747 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now