liven wrote: does that wipe the entire disk?
Sie wrote: I remember JD saying before something about an industrial sander and the disk platters if i remember correctly.....
Schluep wrote: I'll follow that up with getting Intel wireless cards configured and working even when you have the Linux drivers can often be like taking an industrial sander to your teeth instead of pulling them.
Schluep wrote: For more along the lines of your second question liven, I do not know of any tools to safely wipe only a portion of the drive where the specific data you want to ensure is permanantly deleted resides without affecting other files. Even if you overwrite data on a specific portion of the hard drive where the file was located it is often still possible to recover it in some cases. I personally wouldn't trust any software that claims to safely remove all trace of a given file without having an affect on anything else on the drive.
dynamik wrote: Schluep wrote: For more along the lines of your second question liven, I do not know of any tools to safely wipe only a portion of the drive where the specific data you want to ensure is permanantly deleted resides without affecting other files. Even if you overwrite data on a specific portion of the hard drive where the file was located it is often still possible to recover it in some cases. I personally wouldn't trust any software that claims to safely remove all trace of a given file without having an affect on anything else on the drive. Agreed. That's why I **** everything that's even semi-private into TrueCrypt in the first place. Even if they manage to recover a TC file, their work is only just beginning. Nice visual aids, btw
dynamik wrote: Schluep wrote: For more along the lines of your second question liven, I do not know of any tools to safely wipe only a portion of the drive where the specific data you want to ensure is permanantly deleted resides without affecting other files. Even if you overwrite data on a specific portion of the hard drive where the file was located it is often still possible to recover it in some cases. I personally wouldn't trust any software that claims to safely remove all trace of a given file without having an affect on anything else on the drive. Agreed. That's why I **** everything that's even semi-private into TrueCrypt in the first place. Even if they manage to recover a TC file, their work is only just beginning.
JDMurray wrote: If you want to wipe and entire disk partition or hard drive then DBAN using two or three rounds of the pseudorandom data is more than enough. If you only want to erase individual files and folders then give Eraser a try. I like Eraser because it also wipes free disk space and the slack space present in most files. I only wish that Eraser had a setting to rename files before it erased them. As it is now, the erased file's name will persist in the partition file table.
snadam wrote: ahhh, there is nothing like taking a sledge-hammer and going 'office space' on a hard drive...fantastic stress reliever if you ask me!
JDMurray wrote: Keep in mind that there's a difference between erasing a file that currently exists and erasing a file that has already been deleted. The only difference between the two types of files is that the deleted file's disk sectors may be over-written by other files, including a defrag operation. If you "erase" a file, the file's contents are over-written and then the file is deleted. The file itself may be recovered using forensic tools, but the contents of the file are already forever destroyed. In any case, the information of the erased file's existence (file name, date, size) remains in the partition's file table. If you really want to hide the fact that a file ever existed, the best you can do is rename it to some random name before erasing it. (Actually, "the best" would be to only ever write the file to a TrueCrypt volume and then erase the volume file.) Renaming before erasing is the feature that I wish Eraser had. I have also looked for a tool to clean obsolete entries from file tables, but I've been told for DOS and NTFS file systems that operation is impossible to reliably perform. I recommend experimenting with both Eraser and Recuva to see exactly what Eraser is doing to files and how recoverable they are (and aren't).