Solved

need a good windows application for zeroization

Posted on 2011-03-17
6
570 Views
Last Modified: 2012-05-11
i am in the process of erasing emails from our server and local pcs, for legal reasons. i need a good tool for zeroization to permanently remove all traces of this data off the hard disk, while not affecting any aspect of the operating system.

i heard of a cipher.exe application that comes with the newer windows? does it work?, any proprietary software recommendations are also warmly welcome.

Correct me if i am wrong, but i thought i heard something like you have to run these zeroization processes several cycles to fully erase all traces. is this correct??
0
Comment
Question by:CiaranDe
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
6 Comments
 
LVL 27

Accepted Solution

by:
Tolomir earned 167 total points
ID: 35154225
You can give the free ccleaner a try. Choose to wipe free space.

www.ccleaner.com With this setting you clean free space with DoD standard.


Of cause you have to delete those email files before.


17-03-2011-08-15-33.png
17-03-2011-08-16-06.png
0
 
LVL 27

Expert Comment

by:Tolomir
ID: 35154234
you can check with an undelete tool afterwards.

http://www.piriform.com/recuva

It should get you no results...
0
 
LVL 2

Assisted Solution

by:wingkchan
wingkchan earned 166 total points
ID: 35154243
We used the Eraser.  It's a free open source app that permanently deletes data from your computer, while running in windows.  You can right click a file or folder, choose eraser to delete it (or schedule it to run at other time).  I see that it has different erasing standard to choose from.

http://eraser.heidi.ie/index.php
0
Surfing Is Meant To Be Done Outdoors

Featuring its rugged IP67 compliant exterior and delivering broad, fast, and reliable Wi-Fi coverage, the AP322 is the ideal solution for the outdoors. Manage this AP with either a Firebox as a gateway controller, or with the Wi-Fi Cloud for an expanded set of management features

 
LVL 48

Expert Comment

by:dbrunton
ID: 35154271
0
 
LVL 48

Expert Comment

by:dbrunton
ID: 35154276
Correction.  Dban is not a Windows application as requested.
0
 
LVL 83

Assisted Solution

by:Dave Baldwin
Dave Baldwin earned 167 total points
ID: 35154283
There are numerous standards and this article lists some of them: http://en.wikipedia.org/wiki/Data_erasure  Note that erasing a file any number of times has no effect on any remnants of a temporary copy of it.  The temp copy won't even have a directory entry so that you could 'easily' find it.  Forensic software can read a disk sector by sector though and find anything that can be identified.  That's probably why data erasure for security purposes focuses on erasing the entire disk.

That link by @Tolomir may be just what you need though.  Make sure you use that After you delete the file.  And be careful with CCleaner, it is a powerful program.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Smart phones, smart watches, Bluetooth-connected devices—the IoT is all around us. In this article, we take a look at the security implications of our highly connected world.
This article demonstrates probably the easiest way to configure domain-wide tier isolation within Active Directory. If you do not know tier isolation read https://technet.microsoft.com/en-us/windows-server-docs/security/securing-privileged-access/s…
This Micro Tutorial will teach you how to reformat your flash drive. Sometimes your flash drive may have issues carrying files so this will completely restore it to manufacturing settings. Make sure to backup all files before reformatting. This w…
Email security requires an ever evolving service that stays up to date with counter-evolving threats. The Email Laundry perform Research and Development to ensure their email security service evolves faster than cyber criminals. We apply our Threat…

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question