I understand MS makes money on deals like this.
They sold you a product that is available free (i.e. OpenOffice). They charged you $150.
Yes, they probably make quite a lot of money.
I understand MS makes money on deals like this.
Ironically for this forum, all the talk about more than one overwrite pass needed to totally wipe data is actually anecdotal and has never been shown to be true. I'd post a link to a page I wrote discussing this topic but...first post, can't post links - you know the drill.
For nuking disks, I'd recommend a DBAN bootdisk.
Well, I _do_ refer to that rather elderly article. But the page in question is shsc.info/DataRecoveryHere's a link to the original paper I believe you're referring to:
[Gutmann paper link]
Being someone who *hates* opening .pdf links.. I'll offer a nice .htm page that includes a nice little summary matrix of the Military Specs for various storage mediums:
http://www.killdisk.com/dod.htm
I'm not expecting to change people's minds here, much the same as a lot of posters here don't think that they will change a woo's opinion, I guess. Excuses will always be forthcoming, the most popular, of course, being "the guvmint can do it, but they don't tell no-one."
I'm not expecting to change people's minds here, much the same as a lot of posters here don't think that they will change a woo's opinion, I guess. Excuses will always be forthcoming, the most popular, of course, being "the guvmint can do it, but they don't tell no-one."
Don't get me wrong - I WANT this to be a reality. I have several homicide cases that could do with the information. I'm not holding my breath, however.
I've finished moving into my new computer. The old one is going to charity. How do I nuke the hard drive? I can't do it from inside Windows, including from the command prompt in the DOS window.
I know there's a way to boot into DOS, but how do I manage it?
Except, like I said, the NSA outsource their recovery to a private company. A private company that is only too aware of the MASSIVE financial gains to be made from the ability to recover data in this manner.Interesting points. If NSA could decipher erased data more effectively than you are suggesting it would seem to me to be worthy of the highest level of security classification. I would also be worthy of a subtle and confusing disinformation campaign, no?
Given that, why do people cling to this enduring belief? (Or rather, when asked to precure evidence and fail to do so.)
If your issue one of security, then just remove the HD and run a drill bit through it at high speed. If that's too much like work, give it a 'Clint Eastwood' wipe.
this only destroys data in the immediate area of the hole. most of the disk is still recoverable. Shattering (in enough pieces to make reassembly difficult) or melting the platters is preferrable for drive destruction.
Actually what I'm pointing out is your "evidence" is a purely theoretical paper that is based on technology that is not in use any more. You also have ZERO evidence of this method working on current equipment, whereas there are a variety of documents written by people in the data recovery industry who agree with it not being possible.Now we both agree a single-pass data wipe is necessary. Now what about claims that more passes are need to ensure the data can't be read back.
I can point to one paper whose author claims multiple passes are still needed for drives.
The best you can provide is what lawyers call hearsay evidence that would not be presentable in court, or usable in a peer-reviewed paper.
Wait a minute! You are making a bold statement about something that has never been shown to work and _I'm_ the one that has to show some evidence? You can't show a single case, anywhere, where someone has recovered overwritten data to a useable degree and all of a sudden I'm the one with the burden of proof? Come on - now I know you're yanking my chain.The ONLY difference between our two methods is that mine takes 3 times longer. Until you can provide real EVIDENCE, not hearsay, of someone trying this, what equipment and methodology they used then I'll have to stick with my way.