Deleting and Destroying Data Forever

Peoples' private information needs to stay private, even after it has been erased. Wait a minute, after it's been erased?

Have you ever given away an old computer or diskette, deleting the files off it, or giving it a quick format to make sure your information is gone? That might not be enough to stop some one from easily recovering the information!

When you delete a file, normally the operating system and file system say, "ok the file is gone!" but at the physical level the information is still there. If you were to run a recovery program you would be able to see information that you have deleted.

In order to get rid of old data you actually need to write over that same physical location on the hard drive several times to make sure it is gone, or at least much harder to recover. The standard for most government agencies is to do a seven pass wipe. That means that the hard drive will be written over with various sequences and random data seven time to be considered clean.

There are many end user applications that can assist you by wiping data as you delete it multiple times, however it will slow down your system significantly if you are deleting large amounts of data. For the average home user I wouldn't suggest wiping your deleted items more than three or four times, unless you are really worried about the information being recovered.

If you plan on wiping away the entire computer there is some applications that you can use that run from a boot diskette that will allow you to wipe the entire hard drive from start to finish. This process takes several hours, usually left as an "all nighter." (One of those programs you start before you go to sleep!)

You may be thinking, this is great for writeable media, but what about one-write media, such as CD's, DVD's and things like that? Stores sell pretty cool CD shredders, or machines that will indent the media with little holes or pock marks that make it unreadable. But my personal favorite (Do not do this, it's probably dangerous, and will be bad for the unit) is to put CD/DVD media in the microwave for two seconds. It makes the media in to this really cool spider web sort of cracked design that I like to hang on my pin board. As I mentioned, you shouldn't do this method, it's probably really bad for the microwave and might send some bad wave lengths through the room in to your brain, and it will make your microwave smell bad. You have been warned.

The final problem you might have is with hard drives that have failed, often they die at a random time, with whatever information you had on it. You don't just want to throw it in the trash, just in case someone gets creative and tries to recover the information. I highly suggest that you either disassemble it nicely with torques screw drivers (most of them use torques), and trash the plates inside, or be create in how to smash the entire drive until it's broken and flat. If you do decide to dissect it gracefully, the magnets inside are super strong and are great for hanging calendars and heavier items from metal cabinets.

Data security and privacy is such an important topic, always treat your media appropriately as to reduce your risk of passing on private information mistakenly!

Ken Dennis
http://kendennis-rss.homeip.net

move in cleaning service Mundelein ..
In The News:

Cybersecurity experts warn about one of the largest credential compilations ever found, urging users to check "Have I Been Pwned" and change passwords immediately.
Quick iPhone and Android battery optimization techniques help your device stay powered all day by turning off hidden features that secretly drain power in the background.
Kodiak Driver autonomous truck achieves perfect 98 safety score, matching top human fleets in groundbreaking AI evaluation by Nauto's VERA system.
New 401k catch-up contribution rules in 2026 will change taxes for high earners over 50. Learn how scammers exploit these changes and protect your retirement savings.
Kurt Knutsson's guide covers social media privacy protection through location settings, account privacy controls and two-factor authentication to prevent scams and data breaches.
Revolutionary retinal implant restores central vision in 80% of patients with advanced macular degeneration, offering hope where treatments once only slowed blindness.
Learn how to use passkeys on Windows and Mac computers without cameras or fingerprint readers. Discover secure authentication methods that replace passwords.
Tesla's FSD v14.1.2 update reintroduces Mad Max mode, enabling higher speeds and more frequent lane changes than the standard Hurry profile setting.
A phishing email scam targeting American Express customers shows how cybercriminals use fake urgent messages to steal personal and financial information.
Facebook's new Meta AI feature analyzes your camera roll photos to create polished collages automatically, but requires cloud processing and raises privacy concerns.
A New Jersey teenager filed a major lawsuit against AI/Robotics Venture Strategy 3 Ltd. over ClothOff, an AI tool that created fake nude images from her social media photos.
Microsoft reports Storm-2657 cybercriminals sent phishing emails to 6,000 addresses at 25 universities to steal payroll credentials and redirect funds.
Astronomers have discovered asteroid 2025 SC79, a skyscraper-sized space rock orbiting the sun in just 128 days. the second-fastest known.
The Fox News AI Newsletter delivers the latest developments form the world of artificial intelligence, including the technology's challenges and opportunities.
A cyberattack on SimonMed Imaging exposed personal information of 1.2 million patients, including medical records, financial details and identity papers.
Spotify's managed accounts for kids under 13 now available in at least seven countries, allowing parents to filter and block explicit content and songs.
Friendly text conversations about BBQs and social events can lead to WEEX gold trading scams that target older adults with fake investment opportunities.
California company Skyeports creates self-healing glass spheres from Moon regolith that generate solar power and support plant growth for sustainable lunar living.
Cleafy researchers discover fake VPN streaming app Mobdro Pro that installs Klopatra banking Trojan, giving attackers full control over Android devices.
Police departments across the U.S. and Canada are adopting virtual reality training to better prepare officers for high-pressure, real-world situations.
House Bill 469 would prevent AI systems from owning property, serving as executives, or gaining legal personhood in Ohio under Representative Thaddeus Claggett's proposal.
Public voter records expose retirees' personal details to election scammers who create targeted cons using names, addresses, and voting history data.
Instead of fearing what comes next with artificial intelligence, think outside the box. Here are high-earning AI jobs that don't require a computer science degree.
OpenAI CEO Sam Altman says polite words like "please" and "thank you" cost millions annually, while direct prompts may improve ChatGPT accuracy by several points.
Chattee Chat and GiMe Chat exposed intimate conversations and photos, revealing users spent up to $18,000 on AI companions before the breach.

Compile .BAT Files into Native Windows Applications (.EXE)

Since the DOS days, batch files have been one of... Read More

How Does My PC Get Hot

There are many sources of heat that can raise the... Read More

HTML Explained: Part 2

Get started creating web pages using text files and HTML... Read More

Cisco Certification: What To Expect On Exam Day

Cisco Certification: Taking Your First Certification ExamYou've studied hard; you've... Read More

Toshiba Wins Hollywood Support for the HD DVD format

What led them to this choice, as all four studios... Read More

Linux Power Tools - Great Tools to Make System Administration Easy

World War II - Germany decided to attack Poland. Poland... Read More

Windows Task Manager in English

You use Ctrl+Alt+Del to see what's running on your PC,... Read More

Email Management

If you utilize a computer at home or work it... Read More

Temporary Fixes to Spyware, Ad-ware, and Virus Infections

So you've got some spyware, ad-ware, or viruses on your... Read More

Wordpress Plugins

Maybe you always wanted a feature that hasn't been available... Read More

The Help Desk

When you think of a help desk, what do you... Read More

EDTV: What You Should Know Before You Make That Purchase

Enhanced Definition Television ? also known as EDTV ? is... Read More

Flash Your nVidia Video Cards BIOS

You will need the following:1. 1.44MB FDD (floppy)2. NVFLASH utility... Read More

10 Tips to Stay Safe and Secure Online

The Internet can be a dangerous place.While you're enjoying the... Read More

How to Place Home Theater Speakers

You have your television and home theater receiver; you just... Read More

Registry Tools Demystified

Not sure what Windows registry is or how it works?... Read More

Compare MP3 Players for the Coolest Features and Sweetest Deals

How can you compare mp3 players to be sure you're... Read More

Freezing - Time To Warm Up Your PC

Freezing is also known as crashing or hanging. It's frustrating.... Read More

Use Your Computer For Your Entertainment Needs

By using your computer today you can find a lot... Read More

The Many Benefits of Owning a DVR

Has This Ever Happened To You? OK.. it's Friday night,... Read More

Got Virus?

GOT VIRUS? Your Data is NOT lost forever!In the wake... Read More

Help, I Need a New HDTV! (Part 1 of 5)

Feeling overwhelmed in selecting a new TV? With all the... Read More

Protect Your PC from Viruses, Worms & Trojans

Each of the items in the checklist below is part... Read More

Repairing A Corrupt .RAR/.ZIP Archive

Step 1:Open WinRAR and browse to the folder with your... Read More

PDA Bible Free Download

Your Bible At Your FingertipsIt is fairly easy to find... Read More

insured cleaning company Highland Park ..