Search:
Type: Posts; User: kythe; Keyword(s):
Search:
Search took 0.02 seconds.
-
A seven-year-old harddrive is pretty old (and probably noisy, too, compared with today's drives!), assuming the computer has been used regularly. If she has any data to salvage, I'd boot from a...
-
I saw that too, and thought "ATAPI" usually meant CD-ROM :)
The Hitachi drives generally have an excellent reputation, but even they go out after a while. The good news is that they're not...
-
April 19th, 2007, 09:06 PM
I think Nihil had it right: we crossed definitions of "deleted" with "overwriting". A quick format, indeed, leaves the data itself intact and it can be recovered. My apologies for jumping all over...
-
April 19th, 2007, 08:35 PM
I agree, it's important to keep definitions in mind when talking about this topic.
Deleted data and other stray data on hard drives is recovered all the time -- this is one of the ways computer...
-
April 19th, 2007, 05:43 PM
This simply isn't true. As Nihil noted, if it were true, disks would produce errors all the time, as they'd not be able to tell what data is current and which is old.
The normal hard drive...
-
April 19th, 2007, 05:39 PM
All true. It's also true that, though Gutmann described theoretical methods of recovering overwritten data, to date no one has actually demonstrated the practical ability to do so. There are no...
-
April 18th, 2007, 04:10 PM
Very true. And for the most part, even if overwritten data can be recovered, it's not likely that anyone will face that sort of thing. There are probably other, less expensive ways to get the data...
-
April 18th, 2007, 02:29 PM
Theoretically, it's possible. But again, when researchers have actually tried to do it, the signal is buried in the noise--more sensitivity doesn't help.
Usually, what's done is to attach the raw...
-
April 18th, 2007, 02:07 PM
There are lots of considerations. The bottom line, though, is that data overwritten is pretty much unrecoverable by ANY means, episodes of "NCIS" notwithstanding.
The trick is to actually...
-
January 3rd, 2006, 05:20 PM
That isn't quite true. While only Windows XP and Server 2003 by default associate handlers with WMF files, in older systems (e.g. Windows 2000) applications may have easily associated WMF files with...
-
August 27th, 2005, 03:42 PM
What's wrong with downloading or sharing copyrighted material? As long as the copyright holder has given people permission to do so (e.g. Linux, and an increasing number of music artists) then...
-
August 11th, 2005, 01:16 AM
Catch,
I wrote:
To which you responded,
Your current objection is a distinction without a difference: all such labels are, by definition, "relative", as they must be compared with other...
-
August 11th, 2005, 12:47 AM
I agree completely, and if you're bothering to format the drive, I see no reason why you can't spend an extra hour and overwrite the drive at least once.
I think it depends upon just how much...
-
August 11th, 2005, 12:38 AM
And fortunately, I don't require you to care in order to state my opinion. Ah, the beauty of the unbridled Internet :)
The process isn't "high assurance", any more than locking your card door...
-
August 10th, 2005, 11:50 PM
Umm..."easy" being a relative term here. As in "spending tens of thousands of dollars and tasking tens-to-hundreds of thousands of dollars of equipment and a technician or two for several months on...
-
August 10th, 2005, 11:37 PM
There is no application which can read data that the hard drive can no longer sense--this is an impossibility. You have to physically remove the drive platters and subject them to magnetic force...
-
August 10th, 2005, 11:30 PM
While this is true, it's also true that three overwrite passes is sufficient to deal with Secret-level data destruction, according to DoD specs, and that's not small potatoes, either.
The bottom...
-
August 10th, 2005, 11:27 PM
I also recommend DBAN, as someone who's used it and subsequently verified that the wipe was complete.
The one drawback to DBAN, as I understand it, is that it can't yet deal with Host Protected...
-
Ah, but you do have some control -- at least, as far as the destination is concerned. The sites you visit are your choice. Just because someone puts up a publicly-accessible web server on TCP port...
-
Unfortunately, things aren't that simple. Do you have any idea how many networks you're going through to post on Antionline? How about the other web sites or Internet resources you visit every day?...
-
Well, here's the problem: the law, if it forbids this type of activity, is pretty confused.
Not only did the network likely advertise its presence and services (via SSID broadcast), and not only...
-
Yep. Of course, Secunia.com lists two "highly critical" vulnerabilities in IE that have gone unpatched for a long time (one over two years)...
http://secunia.com/product/11/#advisories
-
On the topic of encryption, a program I've been experimenting with is Truecrypt 3.1a (also open source). It incorporates basically unbreakable on-the-fly encryption in several ways, has quite a few...
-
Hi, Andrew,
I've confirmed, using before-and-after direct disk view software, that at least one program does indeed wipe data: Eraser 5.7 (open source software). That includes wiping small files...
-
It should be noted that, at least according to the article, there was no evidence presented that any files were encrypted or evidence destroyed using the encryption program (PGP). It would seem that...
|
|