When you want to permenantly to erase files from harddrive...

Status
Not open for further replies.
sure solaris.... Just do a reformat is is sufficient. I also think compairing a metal harddrive to a plastic disc is a bit unfair and who gives a damn about the US govermant everyone knows the KGB is the bomb j/k.
 
you can still recover after a format and some kill disk programs like... well... kill disk. However, unless you are in serious trouble, I doubt the authorities are going to spend mass amounts of money to send it to the FBI computer forensics to micro tunnel it. Also, it depends on the format. A quick format just erases the master table and the data is still there, a full format does write zeros (data is recoverable, but only by computer forensic experts).
 
physically destroying it. Tell you, its scary as hell what these computer forensics can do. I looked into it once as a possible career, but my god the schooling involved.... They actually use a beam of a gas that I can NOT remember to tunnel into the layers of the plater and then find how far the magnetic resonance has decayed and with that they can determine what was written, and if over writen how long ago its last phase was by the strength in comparison with other sections. Honestly, I can't really explain it but if you're in trouble for any reason then do the smart thing... DESTROY it physically. I'll see if I can google some research on it, its a really interesting read but probably hard to find.
 
read at the very bottom:


Can You Ever Really Erase a Computer File?
What if you use Evidence Eliminator?
By Daniel Engber
Posted Wednesday, June 29, 2005, at 3:24 PM PT

Robert Johnson, who used to be the publisher of Newsday, was indicted on Tuesday for possessing child pornography and for attempting to destroy evidence. A pair of incriminating movies were found on Johnson's office computer, even though he had apparently used a program called "Evidence Eliminator" to wipe 12,000 files from its hard drive. Can you ever really erase a computer file?

It's not easy. When you delete a file from a standard desktop computer, the file first gets moved to the "recycle bin" or the "trash," which means only that you've placed the intact data in a new directory. You erase the file when you empty your recycle bin. But even then, much of the information remains on the hard disk. Exactly how much depends on the type of computer you're using and which operating system you have.

Here's how it works: The information in each file you create gets stored on your computer's hard disk, where it's spread across multiple "data clusters," or chunks of space that each have a particular address. The computer keeps track of where to look for each file; pieces of a single document, for example, might be stored in clusters all over the disk. If possible, a computer will store files in contiguous clusters, so all the information is kept close together.

When you delete a file, all you've really done is tell the computer that it can reuse the clusters assigned to that file for something new. The data in those clusters remains intact, until the computer reassigns and overwrites those chunks of disk space with new files. Experts say that the original data can remain intact for weeks or months, depending on the particulars of the system.

To make things easier for computer-forensics specialists, standard Windows desktop machines even save basic information about the deleted file, like what it was called, how big it was, and which clusters it used. (Machines running Unix don't preserve quite as much information.) But even without every chunk of original data, specialists can scan for particular kinds of deleted files or pull bits of text from a deleted file that has been partially overwritten.

So, what do programs like Evidence Eliminator do? They first "delete" a file in the conventional sense, and then they overwrite it with zeroes, ones, or random data. Finally, they erase the record of where the original file was stored on the disk. More advanced programs might overwrite the original with something less conspicuous than a string of zeroes, like an ordinary text file.

But even if you do wipe your disk successfully—and overwrite each of your deleted files—traces of the original data remain. Writing to a magnetic disk is not as precise as one might think; when you overwrite a file, the new version doesn't completely cover up the old. The leftover data can be read out with certain imaging techniques, like magnetic-force microscopy and magnetic-force scanning tunneling microscopy. Computer forensics experts say it's possible to recover data beneath dozens of layers of overwriting, and privacy fanatics talk about wiping their disks up to 35 times over to be absolutely safe.

Next question?

Explainer thanks Brian Carrier of Purdue University and John Mallery of BKD Consultants.
 
there must be a way besides destroying your disk. How much does it cost the wonderfull feds to perform one of these tasks?
 
oh, its probably expensive as hell. That's why I'm saying unless you're in serious trouble, they wouldn't go through all the trouble. I'm sure there is someway, but I figured with the correct hardware and the correct algorithm they will eventually find ways of going even deeper into the HDD infrastructure and pull what they want.
 
Perhaps I should stop mocking Bush on public forums and deleat my videos of him being a fool then off my HD but what good would that do... Can't take a hammer to it... j/k


This is interesting so they use glass you said? I don't understand how glass would help them read a HD.
 
I could have sworn you said that but I checked the word with the Firefox highlight tool and it didn't show so I guess my imagination was playing tricks on me.
 
Status
Not open for further replies.
Back
Top Bottom