Deleting files from a computer is not enough if one wants to completely get rid of the information contained in them. The operating system is usually unable to locate the files because of missing reference information regarding their location. These files are usually still in the computer kept in some directories and can be retrieved with the help of data recovery programs. This has given rise to many crimes related to the theft of identities for example. Criminals usually gain personal information from old, used computers. For this reason one needs to secure erase hard drives before they dispose of them.
The programs used to secure erase consist of in-built commands that are found in ATA drives built after 2001. These programs work by overwriting on all the tracks of the hard drive. This action renders the previous files inaccessible. One may consider reformatting the disk but this does not achieve the same purpose as data on a reformatted disk is still available.
The eraser programs involve the selection of specific files and folders as well as free disk space, cluster tips and the recycling bin. There is a wide variety different random data patterns that can be used to overwrite the selected data areas. Most of the available software can work with any drive including IDE, RAID and SCSI. Different types of partitions such as NFTS, FAT 16 and FAT 32 are also supported.
Recovery programs may then be used to check for the efficiency of the action. Users should not always expect 100% efficiency as some data may not be erased. This may include data from protected files or that in files still being used. Some data are very difficult to erase but will be removed by free space wiping.
The actions of these programs are irreversible and therefore users need to be very sure that it what they want before they use them. The data is usually lost for good. During the exercise, one is advised to be connected to a reliable power source to avoid disruptions. Power shortages may cause the drive to be locked to any action.
The bottom line is that to secure erase hard drives is a necessary security precaution that one needs to do every time they have to dispose of their computers. Programs for this are available as freeware on the internet but can still be bought.
The programs used to secure erase consist of in-built commands that are found in ATA drives built after 2001. These programs work by overwriting on all the tracks of the hard drive. This action renders the previous files inaccessible. One may consider reformatting the disk but this does not achieve the same purpose as data on a reformatted disk is still available.
The eraser programs involve the selection of specific files and folders as well as free disk space, cluster tips and the recycling bin. There is a wide variety different random data patterns that can be used to overwrite the selected data areas. Most of the available software can work with any drive including IDE, RAID and SCSI. Different types of partitions such as NFTS, FAT 16 and FAT 32 are also supported.
Recovery programs may then be used to check for the efficiency of the action. Users should not always expect 100% efficiency as some data may not be erased. This may include data from protected files or that in files still being used. Some data are very difficult to erase but will be removed by free space wiping.
The actions of these programs are irreversible and therefore users need to be very sure that it what they want before they use them. The data is usually lost for good. During the exercise, one is advised to be connected to a reliable power source to avoid disruptions. Power shortages may cause the drive to be locked to any action.
The bottom line is that to secure erase hard drives is a necessary security precaution that one needs to do every time they have to dispose of their computers. Programs for this are available as freeware on the internet but can still be bought.
About the Author:
You can visit the website secure erase hard drive for more helpful information about http://www.techr2.com
0 comments:
Post a Comment