Wipe / delete hard drive remotely if laptop is stolen

Posted on 2011-10-03
Last Modified: 2012-06-21
Does anyone know of freeware/ open source software/ appllication that will delete my hard drive if my laptop is stolen?  I'm looking for something to wipe the device similar to the Find iPhone app, or a webpage I can log into to remotely wipe the hard drive if I lose position of my laptop.
Thank you
Question by:checkonetwo
    LVL 77

    Accepted Solution

    encryption is better but there are programs like that claim to work..
    LVL 5

    Assisted Solution

    Hey checkonetwo,

    Most remote-wiping software is really expensive (1000 -) mainly used for businesses. for instance you can look up disk agent, or HP has a similar service you can pay for even Fujitsu has it inbuilt to some of their laptops.

    The program I us is 'LoJack" I pay 60 dollars a year and have only used the remote wipe feature once (when I didn't need it I was simply testing a reinstall) it worked amazingly.

    Ultimately, you will have to pay, and I'm not so sure wiping your hard drive instead of tracking it down for the police is the best option, I would look into encrypting (free) software for important files, and maybe buy a one time purchase of lojack if you are really worried.

    I hope this helps,


    LVL 66

    Expert Comment

    Remember, depending on how well the wipe is done, data still might be recoverable. Never used the suggested products, but even a formatted volume can easily be recovered with high success....

    I would second the suggestion above on encryption (no points, just commenting)....
    LVL 1

    Assisted Solution

    why don't you use bitlocker drive encryption?

    it will be available in Win 7 Enterprise & Ultimate editions. if you are an MS Volume license customer, sign Software Assurance for your Os and you will get win 7 enterprise edition.
    LVL 91

    Assisted Solution

    you can use bestcrypt also :
    no need to erase anything
    LVL 59

    Expert Comment

    This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.

    Featured Post

    Courses: Start Training Online With Pros, Today

    Brush up on the basics or master the advanced techniques required to earn essential industry certifications, with Courses. Enroll in a course and start learning today. Training topics range from Android App Dev to the Xen Virtualization Platform.

    Join & Write a Comment

    Don’t let your business fall victim to the coming apocalypse – use our Survival Guide for the Fax Apocalypse to identify the risks and signs of zombie fax activities at your business.
    Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
    In this Micro Tutorial viewers will learn how to use Boot Corrector from Paragon Rescue Kit Free to identify and fix the boot problems of Windows 7/8/2012R2 etc. As an example is used Windows 2012R2 which lost its active partition flag (often happen…
    This Micro Tutorial will teach you how to the overview of Microsoft Security Essentials. This is a free anti-virus software that guards your PC against viruses, spyware, worms, and other malicious software. This will be demonstrated using Windows…

    746 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    19 Experts available now in Live!

    Get 1:1 Help Now