Solved

need a good windows application for zeroization

Posted on 2011-03-17
6
566 Views
Last Modified: 2012-05-11
i am in the process of erasing emails from our server and local pcs, for legal reasons. i need a good tool for zeroization to permanently remove all traces of this data off the hard disk, while not affecting any aspect of the operating system.

i heard of a cipher.exe application that comes with the newer windows? does it work?, any proprietary software recommendations are also warmly welcome.

Correct me if i am wrong, but i thought i heard something like you have to run these zeroization processes several cycles to fully erase all traces. is this correct??
0
Comment
Question by:CiaranDe
6 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 167 total points
ID: 35154225
You can give the free ccleaner a try. Choose to wipe free space.

www.ccleaner.com With this setting you clean free space with DoD standard.


Of cause you have to delete those email files before.


17-03-2011-08-15-33.png
17-03-2011-08-16-06.png
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35154234
you can check with an undelete tool afterwards.

http://www.piriform.com/recuva

It should get you no results...
0
 
LVL 2

Assisted Solution

by:wingkchan
wingkchan earned 166 total points
ID: 35154243
We used the Eraser.  It's a free open source app that permanently deletes data from your computer, while running in windows.  You can right click a file or folder, choose eraser to delete it (or schedule it to run at other time).  I see that it has different erasing standard to choose from.

http://eraser.heidi.ie/index.php
0
Ransomware-A Revenue Bonanza for Service Providers

Ransomware – malware that gets on your customers’ computers, encrypts their data, and extorts a hefty ransom for the decryption keys – is a surging new threat.  The purpose of this eBook is to educate the reader about ransomware attacks.

 
LVL 48

Expert Comment

by:dbrunton
ID: 35154271
0
 
LVL 48

Expert Comment

by:dbrunton
ID: 35154276
Correction.  Dban is not a Windows application as requested.
0
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 167 total points
ID: 35154283
There are numerous standards and this article lists some of them: http://en.wikipedia.org/wiki/Data_erasure  Note that erasing a file any number of times has no effect on any remnants of a temporary copy of it.  The temp copy won't even have a directory entry so that you could 'easily' find it.  Forensic software can read a disk sector by sector though and find anything that can be identified.  That's probably why data erasure for security purposes focuses on erasing the entire disk.

That link by @Tolomir may be just what you need though.  Make sure you use that After you delete the file.  And be careful with CCleaner, it is a powerful program.
0

Featured Post

Optimizing Cloud Backup for Low Bandwidth

With cloud storage prices going down a growing number of SMBs start to use it for backup storage. Unfortunately, business data volume rarely fits the average Internet speed. This article provides an overview of main Internet speed challenges and reveals backup best practices.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

One of the biggest threats facing all high-value targets are APT's.  These threats include sophisticated tactics that "often starts with mapping human organization and collecting intelligence on employees, who are nowadays a weaker link than network…
When we purchase storage, we typically are advertised storage of 500GB, 1TB, 2TB and so on. However, when you actually install it into your computer, your 500GB HDD will actually show up as 465GB. Why? It has to do with the way people and computers…
This tutorial will walk an individual through the process of installing the necessary services and then configuring a Windows Server 2012 system as an iSCSI target. To install the necessary roles, go to Server Manager, and select Add Roles and Featu…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

776 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question