What is the best option for destroying data?

justin101

New Member
Messages
2
EXCLUDING physical.

dod 5229-22 M? or guttman?

Does anyone know if there was cases where there were files recovered from those? like FBI and such?


Also I used dod on my harddrive and used a recovery program and it still found tons of files and most of them in excellent condition.
 

My Computer

System One

  • OS
    windows 7
A Sledge hammer. Or take it out to a gun range and let someone take it out with a .357.

If it is a 2.5" drive, it will shatter into many pieces, once smacked with a mini-sledge (5#'s). If it is a 3.5", take out the screws, remove the platters, keep the magnets, since they come in really handy for stuff at times. Then just toss the platters into a fire to roast them to their death.
 

My Computer

System One

  • OS
    Linux Mint 17.2
    Computer type
    Laptop
    System Manufacturer/Model
    Toshiba Satellite C850D-st3nx1
    CPU
    AMD E1-1200 APU with Radeon (tm) HD Graphics 1.40 GHZ
    Memory
    12GB
    Graphics Card(s)
    AMD Radeon™ HD 7310 Graphics
    Sound Card
    Realtek HD
    Monitor(s) Displays
    LCD
    Screen Resolution
    1366 x 768
    Hard Drives
    Crucial M500 240GB SSD
    Mouse
    Logitech M525
    Internet Speed
    45/6 - ATT U-Verse
    Browser
    Google Chrome
    Antivirus
    None needed. It is Linux.
    Other Info
    Arris NVG589 Gateway; Router - Cisco RV320; Switch - Netgear GS108 8-Port Switch & Trendnet TEG-S50g 5-Port Switch; Access Points - Engenius ECB350, Trendnet TEW-638APB; NAS - Lenovo ix2-4; Printer - Brother HL-2280DW; Air Print Server - Lantronix XPrintServer

    A/V UPS - Tripp-Lite Smart 1500LCD 1500 Va/900 W.
A Sledge hammer. Or take it out to a gun range and let someone take it out with a .357.

If it is a 2.5" drive, it will shatter into many pieces, once smacked with a mini-sledge (5#'s). If it is a 3.5", take out the screws, remove the platters, keep the magnets, since they come in really handy for stuff at times. Then just toss the platters into a fire to roast them to their death.

read op before responding.
 

My Computer

System One

  • OS
    windows 7
A Sledge hammer. Or take it out to a gun range and let someone take it out with a .357.

If it is a 2.5" drive, it will shatter into many pieces, once smacked with a mini-sledge (5#'s). If it is a 3.5", take out the screws, remove the platters, keep the magnets, since they come in really handy for stuff at times. Then just toss the platters into a fire to roast them to their death.

read op before responding.
I did. What I gave you is the way to keep anyone from recovering any information from a Hard drive. As for can anyone recover information from it. I can do it in less than two minutes with a Forensics program, which any law enforcement agency would use.

If you really did not expect an answer to your question, what did you intend from posting it on a computer forum.
 

My Computer

System One

  • OS
    Linux Mint 17.2
    Computer type
    Laptop
    System Manufacturer/Model
    Toshiba Satellite C850D-st3nx1
    CPU
    AMD E1-1200 APU with Radeon (tm) HD Graphics 1.40 GHZ
    Memory
    12GB
    Graphics Card(s)
    AMD Radeon™ HD 7310 Graphics
    Sound Card
    Realtek HD
    Monitor(s) Displays
    LCD
    Screen Resolution
    1366 x 768
    Hard Drives
    Crucial M500 240GB SSD
    Mouse
    Logitech M525
    Internet Speed
    45/6 - ATT U-Verse
    Browser
    Google Chrome
    Antivirus
    None needed. It is Linux.
    Other Info
    Arris NVG589 Gateway; Router - Cisco RV320; Switch - Netgear GS108 8-Port Switch & Trendnet TEG-S50g 5-Port Switch; Access Points - Engenius ECB350, Trendnet TEW-638APB; NAS - Lenovo ix2-4; Printer - Brother HL-2280DW; Air Print Server - Lantronix XPrintServer

    A/V UPS - Tripp-Lite Smart 1500LCD 1500 Va/900 W.
A Sledge hammer. Or take it out to a gun range and let someone take it out with a .357.

If it is a 2.5" drive, it will shatter into many pieces, once smacked with a mini-sledge (5#'s). If it is a 3.5", take out the screws, remove the platters, keep the magnets, since they come in really handy for stuff at times. Then just toss the platters into a fire to roast them to their death.

Removing the platter is enough to destroy the data :p
 

My Computer

System One

  • OS
    Windows 10 Pro
    Computer type
    PC/Desktop
    System Manufacturer/Model
    Custom build
    CPU
    i5-6500 @3.20GHz
    Motherboard
    Gigabyte B150-HD3P-CF
    Memory
    16GB DDR4 2133 Crucial Ballistix Sport LT
    Graphics Card(s)
    MSI GeForce GTX 1060 GAMING X 6G
    Sound Card
    Built-in
    Monitor(s) Displays
    Liyama ProLite XB2483HSU-B2
    Screen Resolution
    1920 x 1080
    Hard Drives
    Crucial MX200 500GB & Toshiba DT01ACA300 3TB
    PSU
    Corsair RM550x
    Case
    Fractal Design Define S
    Cooling
    Cooler Master TX3 i
    Keyboard
    Func KB-460 (MX Red)
    Mouse
    Corsair Gaming M65 RGB
    Browser
    Google Chrome
    Antivirus
    Bitdefender Total Security 2017 + MBAM Pro + MBAE Pro
    Other Info
    Creative Sound Blaster Tactic3D Rage V2 headset
Any decent security program that overwrites a file or disk even once is proof against all software recovery methods. If you are able to see files after such a method was used then something went wrong. Often this would be user error.

A theoretical method of recovering files that have been overwritten was outlined in a paper published by Dr Peter Gutmann in 1996. In theory you could recover files by detecting the magnetic patterns that remained after the file was overwritten. Experiments have confirmed the theory but practical application is something entirely different. There have been unconfirmed reports that security agencies such as the FBI can actually do this. Those who may have this capability are not talking.

There is no firm evidence that any significant data has ever been recovered using Dr Gutmann's method. When devised it was nothing more than a theoretical possibility. The multiple pass security programs were "just in case" the method was viable.

Remember that the paper was written in 1996 when hard drive technology was very different than it is now. Dr. Gutmann himself is skeptical that his methods have any relevance with modern hard drives.

In any event the method (if it was ever viable) would require advanced hardware and knowledge. This could not be done with software alone.

Many organizations require physical destruction of storage media before disposal. But this isn't because software methods are not sufficiently reliable. It is matter of verifying the results. No great technical ability is required to physically destroy a drive and the results can be verified with a quick visual inspection. No so with software methods.
 

My Computer

System One

  • OS
    Windows 7
    Computer type
    PC/Desktop
It depends if the person intends to keep the computer or sell/donate it. I have always recommended BitEraser or East-Tec Eraser. BitEraser is great since it provides a Digitally Signed Certificate in the event you consult with companies or people who need proof the data was destroyed.

Of course, if there ultra serious privacy issues, I would wipe the entire drive and then physically destroy it as noted in the preceding post. Again, it depends upon the threat level, and in some cases the law, for example if you are a defense contractor replacing a computer with a new one. Nonetheless, I wish every here happy hunting for the best privacy option. Darren Chaker
 

My Computer

System One

  • OS
    Windows 11
Back
Top