3

I heard about people that used tools to recover deleted data and found a lot of unusual data, that after discovered that the their brand new pc in truth was used...

When discarding HD's, as sysadmin, we need be sure that the data in disk is unrecoverable.

Do you know some tool to safely format the hd then the data cannot be restored? As usual, free is better.

HopelessN00b
  • 53,385
  • 32
  • 133
  • 208
Click Ok
  • 956
  • 4
  • 12
  • 18

7 Answers7

4

See: Sugestions for cleansing PC's before recycling / disposal

C. K. Young
  • 1,842
  • 16
  • 16
4

http://www.dban.org/

Darik's Boot and Nuke ("DBAN") is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.

It does a good enough job. Like jldugger said it's enough to write 0s to the drive, you could always smash it with a hammer and take out some frustration about "that one user" shrug

RateControl
  • 1,207
  • 9
  • 20
2

Also see How should I securely wipe data from a hard drive?

Hamish Downer
  • 9,142
  • 6
  • 36
  • 49
2

Use the free Eraser software to securely remove sensitive data from your hard drive. You can even choose the data wiping algorithm and the strength of the erase making it almost impossible to recover your data.

Robin Rodricks
  • 540
  • 2
  • 10
  • 27
1

You would do well to read the Epilogue to Gutemann's publication "Secure Deletion of Data from Magnetic and Solid-State Memory". The gist is that recovering data isn't possible on newer technology, so just write zeros to the drive and call it a day, or use Gutemann's tool to satisfy the tin-foil crowd.

jldugger
  • 14,122
  • 19
  • 73
  • 129
1
  • MHDD ERASE commadd. MHDD is also good tool for remap, fix drive, etc.
  • shred /dev/[yourdevice]

    1. shred is a part of GNU coreutils (in Windows it can be used as a part of cygwin).
    2. Individual files can't be shredded totally securely on journaling filesystems, though.
    3. If you are shedding the device make sure to shred journal as well (journal can be stored on separate device).
Alex Bolotov
  • 857
  • 3
  • 10
  • 17
  • 1
    most people that uses OS'es these days use journaled file systems, which the shred utility itself says it is of limited use for... – Steen Oct 12 '10 at 21:40
0

As the others have said, writing zeroes should be sufficient. You can also write random data, or do a secure wipe, if you're really paranoid.

Someone wrote an open challenge to anyone who could recover data from a drive that was overwritten with zeroes, and also contacted 3 data recovery firms for the challenge: http://hostjury.com/blog/view/195/the-great-zero-challenge-remains-unaccepted

The article includes a paraphrased conversation with someone at one of the data recovery firms contacted for the challenge:

"According to our Unix team, there is less than a zero percent chance of data recovery after that dd command. The drive itself has been overwritten in a very fundamental manner. However, if for legal reasons you need to demonstrate that an effort is being made to recover some or all of the data, go ahead and send it in and we'll certainly make an effort, but again, from what you've told us, our engineers are certain that we cannot recover data from the drive. We'll email you a quote."

rob
  • 1,253
  • 1
  • 10
  • 17