We constantly recall the importance of recycling. Recycling of computer equipment in the ICT industry can be useful for educational or charitable organizations. However, this may be detrimental to the previous owner. Charitable institutions, such as Computer Aid International, refuse to recycle computers in various sectors, including education, health and other nonprofit organizations in favor of developing countries. Computer Aid International appears to delete the & # 39; all hard disk drives, which is good news, because hopefully some of the certyty data that can not be downloaded.
However, there is no doubt that the & # 39; average & # 39; the user recognizes the risks of selling the old computer via eBay, such as eBay. They can delete all their files, re-install the OS (OS), and possibly format the drive, but the data is likely to be on the disk, typically in a non-shared space. Data fragments may appear that could be maliciously used by a criminal; Indeed, data from any source, that is, any electronic device can be maliciously used. Removing computer tools without proper care will cause the owner or organization to cause irreparable damage to financial, political and personal injury.
According to the latest study by Glamorgan University (source: Time Online), more than 50% of the purchased hard disk 111 contains personal and confidential information. More than 87% of the drives were purchased from eBay. This, I feel, is an international concern. The basic concept of eBay and other online auction sites is to unite sellers and individuals in online commerce and create a worldwide marketplace. While this is a legitimate user, we risk risking the transfer of personal information to terrorists, corrupt organizations, and pedophiles, not to mention the risk of extortion or threat.
So the question is: what is the best way to erase data from hard disks and protect ourselves against such threats? Taking into account the economic, confidentiality of data and environmental factors, we discuss the different possibilities of different public and private sectors.
What software options?
You can usually choose to physically destroy hardware or use software or hardware to erase data. There are a number of software programs that can destroy data and typically provide software assurance. destruction of data. Yet is it enough? This approach stems from the fact that the user installs the software correctly and performs the correct procedure. In most cases, a computer only has one hard drive; yet implementing such a program (and achieving the desired "100%" destruction result) usually requires an operating system. In other words, another hard drive is required to run the software so that data can be deleted from the unwanted drive. Alternatives can be bootable programs, such as DBAN (Darik Boot and Nuke), which claims to "delete the contents of the detected hard disk." Other software options: AccessData – WipeDrive, Acronis – Drive Cleanser, CyberScrub – CyberCide and VCOM – SecureErase. These available applications are just a hand.
Software approach can cause costs; although some applications are probably free on the Internet. The disadvantage of the software-based approach is time consumption. Usually "chopping" Irish data for each drive sector. The type of data depends on the application; however, it may contain characters or numbers. The process, assuming the numbers, is known as "binary flipping". Basically, a binary number, like 11110000, is written for each sector, then the "flip side" or the compliment as it is known. In this case it would be 00001111.
According to research, the United States Department of Defense considers this approach to be acceptable with appropriate executions and special algorithms for the destruction of non-critical data. However, it is suggested that up to 32x executions be checked for "cleaned" disks. Therefore, we must consider the complications and factors of such extremes. The 32-time cleaning of the drive requires a large amount of time, therefore it loses electricity, time and obviously human and computer resources. This process can take several days, if not seven if there are hundreds of disks.
What hardware options are there?
DiskMaster is an excellent example of how data can be destroyed by hardware approach. Fast, efficient, and set a predefined pattern that you should write to disk. DiskMaster can remove drives from the Ministry of Defense.
However, this approach requires a lot of time to delete the drive. The hard disk drive concept has evolved since the 1950's, where the 5 MB (Mega Byte) data can be stored. We are now at a time when 750 GB (Giga Bytes) can be stored on one disc. This inevitably means destroying a disk or software or hardware-based approaches will increase over time, cost, and consequently patience.
Are there any other options?
I think physical destruction is the fastest and simplest approach. Removing the upper disk of the hard disk drive may limit the ability to recover data due to dust and other contaminants that affect drive disks (where your data is stored). Physically scoring lines or drilling holes in the bowl hopefully destroy the data without any reasonable doubt.
A concept for the destruction of paper with the use of printed materials, such as Your bank account statement or identity theft and forgery account has now reached the next level. Now available is industrial tape and hard di