Hi guys,
I'm going to sell my desktop computer on trademe and will format the hard drive, but is there a safer way to ensure data cant be recovered? I understand even after formatting, the data may still be there?
Cheers,
|
|
|
are you selling it with an OS? or just an empty HDD?
I'm selling the desktop PC... with everything (yes including the hard drive) :)
It's only family photos and videos ect so i doubt anyone would be interested in seeing them anyway.
Surely if i format the hard drive, then fill all the hard drive space with blank files, then delete all the blank files, then all previous data would be gone? Logically this seems right? If the hard drive is completely over ridden with new files, how could the old files physically still be available as there would be no space for them?
DBAN is a good option, you download the image and create a boostable cd/usb etc and follow the onscreen instructions
loceff13:DBAN is a good option, you download the image and create a boostable cd/usb etc and follow the onscreen instructions
I just boot Debian off a live CD image (on a usb stick), then just good old dd.
https://www.youtube.com/watch?v=8yC1zwFiiyg
NSA level wipes are just paranoia unless you are a person of interest to three letter agencies.
If you do not want to wipe and do a fresh install but are prepared to hunt down and delete all the files you want gone a useful tool is the command 'cipher' run from an administrator cmd.exe window.
This tool has an option to wipe data from deallocated space on the disc. It is installed on my Windows 10 box.
Microsoft Technet article;
https://technet.microsoft.com/en-us/library/bb490878.aspx
simon14:
It's only family photos and videos ect so i doubt anyone would be interested in seeing them anyway.
Surely if i format the hard drive, then fill all the hard drive space with blank files, then delete all the blank files, then all previous data would be gone? Logically this seems right? If the hard drive is completely over ridden with new files, how could the old files physically still be available as there would be no space for them?
That is mostly secure against some random punter using a standard OS and software but it is not close to secure using the tools available for drive analysis.
The problem arises because when you write your new data to the disk, you are writing it on top of what was there before. That means that, if you write 12345 to a part of the disk, you will always read back 12345. If you look hard at the analogue signal coming off the disk's read head, you can tell that the data last written was 12345 but that before this, the disk held the data abcde. So far as I am aware, the state of the art is to be able to go back to see the last four sets of data that were written to a drive if the data was truly random. If the data was not truly random then you might be able to go back further. That is why so called secure erase will write true random data five or more times.*
Do you need to worry about this? Such analysis of disk data is expensive and requires skilled staff and considerable time for analysis. I doubt that the FBI did this to KDC's hard drives but I bet that the NSA did it to the hard drives that they recovered from OBL's compound in Abbotabad. You are most likely safe from this threat.
Even flash drives are susceptible. It is a lot harder and more expensive but I have seen people operating tech that would tell you what data was in a flash cell before it was erased and rewritten. I doubt that even the NSA will use such tech other than to prove that they can do it in case they ever come up against a target that makes it worthwhile.
[* Another way to think about this is to consider a whiteboard. I can write something on a whiteboard and you can sit in my audience and read the what I have written. I can then rub it out with a cloth and write something new and you can sit there and see what I have written now. If you sneak up to the board at the end of the second presentation, you can have a close look and you will most likely see what was written the first time and perhaps the time before that as the erase process is not perfect.]
|
|
|