Announcing: Slashdot Deals - Explore geek apps, games, gadgets and more. (what is this?)

Thank you!

We are sorry to see you leave - Beta is different and we value the time you took to try it out. Before you decide to go, please take a look at some value-adds for Beta and learn more about it. Thank you for reading Slashdot, and for making the site better!

How To Really And Fully Wipe A Hard Drive?

timothy posted more than 13 years ago | from the say-what-do-you-have-on-there-anyhow? dept.

Hardware 108

root_dev_X ventures: "Admittedly, this is a random question, but here goes - Does anyone out there know of any ways to totally erase the data on a drive? Some friends of mine got into a discussion about this not too long ago; one of them told me they had heard from a friend in the military that they hooked up old HDDs to modified stun-guns and zapped them in order to totally erase them - apparently this method scrambled the magnetic field of the disk, leaving the data irrecoverable. Does this work? Are there any other methods for "data-destruction" (keeping the platter intact, that is)?" A nice "obliberate data to the point of senselessness" tool would be nice -- or is keeping the platter intact a senseless question if you want true security?

Sorry! There are no comments related to the filter you selected.

Re:its easy.... (3)

babbage (61057) | more than 13 years ago | (#413718)

...and ineffective.

Playing off ideas from Bruce Schneier's writings, there are three different people you want to protect yourself against here: casual snooopers, experienced hackers, and dedicated experts.

The casual snooper is someone like, say, my mom, who is baffled by Windows Explorer. You strategy will handle people like this very well, for the most part. If however you're trying to "really" wipe out the hard drive though, that's not enough.

The next person is the moderately adept hacker, who probably has the smarts but doesn't necessarily have the tools to get everything. This kind of person might be able to, for example, mount your hard drive on a Linux system and use various filesystem tools to retreive the contents of the disc. This is easier to do than you might think (anecdote: on my last computer, I went through various partitioning schemes to make room for Win95, BeOS, and Linux. I was surprised to find that one of my reinstalls brought me back to an earlier state of the disc, because the "new" partitioning was one I had used before, and the data was now accessible again. What I thought I had thrown away forever was once again accessible). A quick format might or might not fend off this level of cracker, but don't get your hopes up. A more thorough defense here would be to rewrite the whole drive at least once, if not a handful of times, with something like 1010101010101010101 etc.

The third level of cracker is someone with both the expertise and the tools needed to get whatever they want from your drive. Apparently, the magnetic field on the disc stores an imprint of the last dozen or so writes, thus the above 101010101 strategy only masks the contents of the disc, but it does not remove them. Slightly more clever destruction attacks add more entropy to what you're writing to the disc (add in enough variation to disrupt the magnetic field in various ways: 0000000111111111000000001111111) but even still you're just sweeping over your tracks, not really eliminating them. For this level of attacker, the only sure defence is really to thoroughly destroy the disc -- break it, burn it, scratch it up & cast the remains to the four corners of the world.

So, the short answer to the original question would be something like: "yes, it's possible to *really* erase a disc, but you have to know who you're trying to hide things from and how far you're willing to go to hide it."

Just destroy the sucker.. (1)

cmowire (254489) | more than 13 years ago | (#413719)

A few points that haven't been mentioned yet.

1) Even if you overwrite the data with a "Military grade" data wipe tool, there exist pieces of hardware that will still be able to recover your data, if they want to enough.

2) Low-level formating is left for the factory. Modern drives have embedded servo information that you can't recreate without the aid of expensive factory hardware. And that wouldn't help you too much, anyways, given that it won't do a satisfactory job of wiping the disk.

This is why the manual warns you to not degaus the drive.

So your best bet is to just destroy the sucker. First wipe the drive using one of the wiping tools mentioned and then have fun.

I'd suggest you try microwaving it. But don't use your own microwave, because it'll probably end up frying the microwave given enough time. The fireworks are sure to be a crowd pleaser.

You also might consider playing hard disk platter frisbee. Although, with modern 3.5" drives, it's a lot harder than 5.25" or 8" platters.

And, once you've had your fun -- make sure that your disk platter frisbee buddies are people you trust -- just thermite the platters. You can find instructions on how to do thermite at any popular anarchist webpage.

If you leave the drive usable, there is always the possibility of discovery.

Re:destroy and dispose (1)

gordlea (258731) | more than 13 years ago | (#413720)

4. Put picosats in an unstable orbit and allow them to burn up re-entering the atmosphere.

Re:Data destruction 201 (2)

SEWilco (27983) | more than 13 years ago | (#413721)

Burning lighter fluid in a metal wastebasket won't do all that much to the data on the platters. There's not very good air circulation, and lighter fluid burns at a low temperature. There should be air holes in the incinerator, at least, and preferably plenty of fuel.

You need to raise the temperature of the magnetic coating above the Curie temperature [britannica.com] (770 C for iron). But as the platters are probably aluminum, and the melting point of aluminum is around 660 C -- you're probably going to have to settle for melting the platters and stirring them up.

Be aware that melting aluminum in your wastebasket will damage your wastebasket. And you probably should not do this near your cubicle.

"Keeping the platter intact"... (1)

yabHuj (10782) | more than 13 years ago | (#413722)

If this is a must, brutal (and safe) methods like using high-capacity de-magnetizers, sanding off the platter cannot be used.

I guess you want to re-use the hard drive after deleting? Then you are stuck with software methods. A stated before you will need MANY truly random overwrites before the disk really is not recoverable. With Linux try (for drive /dev/hdX) something like below and repeat it 50 times. That should do the job.

dd if=/dev/random of=/dev/hdX

Re:How to destroy anything... (1)

AlphaWolf (75747) | more than 13 years ago | (#413723)

Give it to a five-year-old with one of these [iwarp.com] , and watch the fun.

Alternatively, store all of your important data on a Conner CFS1275A [seagate.com] . Probably one of the worst drives ever built. Had no less than five of them die on me in one week. Just wait for the "thunk-thunk-thunk" sound, and you're all set.

Simple! Follow these three steps: (1)

T. (128661) | more than 13 years ago | (#413724)

(Works almost every time I have tried it.) 1. Buy a Western Digital HDD; 2. Wait a short time; 3. Repeat, if necessary.

Herkimer... (2)

bobhope (118008) | more than 13 years ago | (#413725)

I think the best way to destroy would be to bring it to the Herkimer Diamond Mines (http://www.wpi.edu/~stype/herk2k.html (see pictures)). Just use it as a fulcrum or a chisel and it won't last long. I have seen old leaf springs (tempered steal, VERY hard!) that had been converted into wedges twisted worse than Dale Earnhardt's car.

Or you could just give it to my friend Liz, she seems to break everything....

Re:Cryptonomicon: magnetic doorway (2)

Pogue Mahone (265053) | more than 13 years ago | (#413726)

they're erased with no effort

Who are? The disks, or the people who are leaving?


Re:Now you did it (1)

helleman (62840) | more than 13 years ago | (#413727)

From Secure Deletion of Data from magnetic and solid state memory. [auckland.ac.nz]

In conventional terms, when a one is written to disk the media records a one, and when a zero is written the media records a zero. However the actual effect is closer to obtaining a 0.95 when a zero is overwritten with a one, and a 1.05 when a one is overwritten with a one. Normal disk circuitry is set up so that both these values are read as ones, but using specialised circuitry it is possible to work out what previous "layers" contained. The recovery of at least one or two layers of overwritten data isn't too hard to perform by reading the signal from the analog head electronics with a high-quality digital sampling oscilloscope, downloading the sampled waveform to a PC, and analysing it in software to recover the previously recorded signal. What the software does is generate an "ideal" read signal and subtract it from what was actually read, leaving as the difference the remnant of the previous signal. Since the analog circuitry in a commercial hard drive is nowhere near the quality of the circuitry in the oscilloscope used to sample the signal, the ability exists to recover a lot of extra information which isn't exploited by the hard drive electronics (although with newer channel coding techniques such as PRML (explained further on) which require extensive amounts of signal processing, the use of simple tools such as an oscilloscope to directly recover the data is no longer possible).

So, in conclusion - Sorry, can't be done without modifying the electronics in the drive. That might be a challenge to the drive manufacturers though... how to get your density doubled by purposefully use the overwrite and read both the previous and current data! Kind of the same idea as the two bits per cell technology used by flash memory manufacturers...

Yes there is! (1)

T. (128661) | more than 13 years ago | (#413728)

Heat the magnetic medium. Heat randomly orients the poles.

separate the pieces (4)

PapaZit (33585) | more than 13 years ago | (#413729)

There is at least one military organization that decomissions drives by overwriting them a bunch of times. Then, they cut the drive in half with a saw and take each half to a different facility for disposal (which usually involves melting the drive).

See Peter Gutmann's Usenix paper on secure deletion of data from magnetic and solid state memory [auckland.ac.nz] for some truly impressive data recovery methods.


Re:This won't work. (2)

Tackhead (54550) | more than 13 years ago | (#413730)

>if you're not going to damage the surface of the drive, you're going to need to format like crazy, and fill it with junk every time.

Yup. And even this won't work. Suppose you've got data in marginal sectors on the drive - the data gets mapped to spare tracks, and the marginal sectors are blocked out and remapped by the drive's firmware.

No amount of repartitioning and reformatting and "overwriting with junk" will overwite the mapped-out sectors, because the OS (and BIOS) never sees the mapped-out sectors.

Whether this is sufficient depends on who your imagined adversary is.

If it's Joe Average, who bought your used P166, repartition and don't even bother reformatting.

If it's Joe Linuxgeek, who bought your used P166, repartition and overwrite with junk.

If it's Fred the Fed, degauss. This will likely ruin the drive, as there's lots of information embedded between tracks on the platters that the drive heads use to figure out whether they're tracking correctly. This is why you can't "low-level" format (in the sense that you could with old-sk00l MFM drives) an IDE drive.

If you are Fred the Fed, and just got busted for selling secrets to the Russians... it's too late to use thermite.

There are reasons why military and intelligence organizations require physical destruction of drives on which classified material has been stored.

The right way, the wrong way and the Navy way (1)

John Jorsett (171560) | more than 13 years ago | (#413731)

Well, I can tell you how the Navy at a top-secret comm installation was supposed to do it if the place was in danger of being overrun: pile all sensitive stuff (hard drives, crypto machinery, etc.) in the parking lot, put thermite bricks on top of it, then melt everything into slag. I think it was more for speed than effectiveness. They might not necessarily have the time to do it in a less spectacular fashion.

Re:There is no 100% sure way to destroy data. (3)

Tackhead (54550) | more than 13 years ago | (#413732)

>Several wiping programs are available that will overwrite data multiple times with binary patterns - checkerboards, solid 0's, solid 1's, random patterns, etc.

You correctly point out that physical destruction of media is the only way to be sure.

One thing to be aware of when overwriting data with patterns is that what you think you write to disk isn't what you write to disk.

A string of "00000000" isn't "all magnetic north poles up", and a string of "11111111" isn't "all magnetic north poles down".

Drive firmware maps these bit streams into encodings that are broken up into patterns of ones and zeroes that the heads can always read - much the same way that your serial port would get very confused if you tried to download a 100K file of "all zeroes" by just holding the ReceiveData line low for 30 seconds with no parity or stop bits.

The actual encoding method by which the bitstream is encoded into alternating magnetic patterns is probably drive-dependent. As a result, the "ideal" pattern of bytes the controller should write to the drive to create patterns of alternating, or mostly-North, or mostly-South, magnetism, will also be drive-dependent.

Practical application: The Apple ]['s "disk ][" floppy controller used to have a feature where you could tell the floppy drive to give you the data as seen by the read/write head. By changing the encoding scheme to a less-redundant, but equally-reliable one, you went from 13 sectors per track to 16 sectors per track. Many copy-protection-breaking programs of the day would give you the bytes as seen by the drive head and use this to determine what encoding (or if a custom encoding) was in use.

In hard drives - MFM and RLL are two encoding schemes. RLL drives were exactly the same hardware inside, but used a different encoding scheme. RLL stood for Run-Length-Limited, where "Run-Length" can be loosely translated into "number of consecutive all-north-poles-in-a-row the drive firmware will tell the head to read/write for any given input bit sequence. As such, the RLL version of a drive typically had 30M of user space, whereas the MFM-encoded drive - same hardware - had 20M of user space.

Today's drives work on the same mechanism at the head/platter level, it's just buried under many more levels (BIOS, C/H/S remapping, LBA, etc. etc. etc.) of abstraction.

Others have posted links to this paper [auckland.ac.nz] . I've merely summarized section 3. It's a damn good paper.

If it's important - whether military or corporate secrets - physically destroy the media and buy a new drive.

Re:How about Something Different (2)

Tackhead (54550) | more than 13 years ago | (#413733)

>Memory is recoverable from DRAM/SRAM for some time. Not trivially, but it takes a long time for the electron density in all of the cells to return to a statistically meaningless state.

True. An old stunt we used to love doing as kids was to load an image into an Apple ]['s graphics RAM, then power-cycle the machine and go into graphics mode on power-up.

Most of the time, there was corruption, but the image remained recognizable - the chips retained the ability to return a TTL signal to within spec - even after 5-10 seconds of power-down.

I have no doubt the data was recoverable (i.e. measure analog voltages) for power-down periods of time much longer than that.

Obvious solution (1)

Baloo Ursidae (29355) | more than 13 years ago | (#413734)

# dd if=/dev/zero of=/dev/hd? # dd if=/dev/urandom of=/dev/hd?


Big ass magnet (2)

AntiFreeze (31247) | more than 13 years ago | (#413735)

And I'm not kidding.

I've done it before, works like a charm.


Re:Other techniques (1)

Mr. Penguin (87934) | more than 13 years ago | (#413736)

Here's what I would do:

$max = size of drive in Kb;

$drive = location of drive in /dev

fdisk $drive
delete all partitions
dd if=/dev/zero of=$drive bs=1024 count=$max

That should completely wipe it out.

Re:There is no 100% sure way to destroy data. (1)

compwizrd (166184) | more than 13 years ago | (#413737)

Wouldn't surprise me if the producers of Terminator 3, somehow managed to get one of the Terminators out of that foundry vat though.

Re:Big ass magnet (1)

Anonymous Coward | more than 13 years ago | (#413738)

i wouldn't trust this method.

drives have gotten so dense that it is very difficult to depolarize all the data reliably.

you would probably need an alternating electromagnet capable of picking up a car to do serious damage... and even then...?

Re:its easy.... (4)

Royster (16042) | more than 13 years ago | (#413739)

...and ineffective.

/. needs a new moderation category "didn't get the joke".

Simple (4)

SanLouBlues (245548) | more than 13 years ago | (#413740)

Put it under that gun that shrinks quarters. Give it to a friend. Say "Hey man I compressed my hard drive" :)

Hysteresis is your friend. (2)

nylreM (69033) | more than 13 years ago | (#413741)

http://www.lassp.cornell.edu/sethna/hysteresis/Wha tIsHysteresis.html

Stick the platters near a source of strong alternating magnetic fields, change the relative 3d orientation of the source a few times, and run the source for a long time. Make sure there's no interposing metal that could reduce the field density at the surface of the platter, or increase field strength to compensate, and then melt the entire drive.

Physical distruction (2)

SuiteSisterMary (123932) | more than 13 years ago | (#413742)

When you cannot have ANY data recoverable, you either acid bath the thing into non-existance, or melt it into undifferentiated slag, and break the lump into little bits, and pass it around. Lets assume that doing the standard 'alternating 10-pattern fill' routine is 99.999 percent effective. On a 10 gig drive, that leaves 1 megabyte recoverable. For some applications, that's 1 megabyte too much that can be recovered.

Re:Other techniques (1)

inburito (89603) | more than 13 years ago | (#413743)

Data recovery labs can recover just about all of the information you destroy like that, writing just once isn't enough.. twice probably wouldn't do it either. Couple of dozen times of this and perhaps you've erased most of the stuff you had there.

Using different patterns for different passes is advisable so that there's no recognizable residue left. Writing just zeros two dozen times probably wouldn't obfuscate the residue enough to stop someone determined with the right equipment. So you need to replace /dev/zero with /dev/random to make the data on your hd unrecovable for say the fbi..

And Don't Forget To Wipe Your RAM! (1)

BMazurek (137285) | more than 13 years ago | (#413744)

No, it's apparently far far far more difficult than that to erase a hard drive.

There is a paper from a 1996 USENIX Security Symposium that might be of interest. The paper is titled Secure Deletion of Data from Magnetic and Solid-State Memory [sourceforge.net] . It's chock-full of interesting tidbits...

Included are not only current (as of 1996) techniques for wiping a drive as well as your RAM(!?!?!).

Now, if that was current in 1996 (for the mainstream at least), what did organizations like the NSA have then. And, better yet, what do they have now?

Howto (1)

PhunkySchtuff (208108) | more than 13 years ago | (#413745)

Well, all these methods kind-of touch on various things you need to do to ensure data is irrecoverable.
Now, we can discard 3/4 of the posts that have something along the lines of "destroy the platters" as you _don't_ want to do that.
Next, overwriting with random data a few times is good. You will need to overwrite many times, using both sequential and random access patterns. If using just, say, sequential access (a-la format, even a low level one) there will be recoverable traces of your data at the edges of the tracks. The hard drive itself can't recover this data, but experts can.
Then overwrite the drive multiple times, not with random data, but with a fixed pattern to fully magnetize with the new data, say overwrite it with 0xFF multiple times in a row (sequential and random access) and then with 0x00, again multiple times in sequential and random access patterns)
Then you will need an implicit knowledge of the particular drive geometry and encoding methods, so you can calculate Worst Case Scenarios for both access patterns and data modulation.
One poster mentioned the old MFM worst case data pattern of 0xDAC3. This will be differnet with newer drives and encoding schemes.
Do this a few times and you should be safe
-- kai

Verbing Weirds Language.

Then again... (1)

CptnHarlock (136449) | more than 13 years ago | (#413746)

On a 10 gig drive, that leaves 1 megabyte recoverable.
That 1 megabyte is not consistent. A byte here and a byte there still make no sense...

$HOME is where the .*rc is

Re:Cryptonomicon: magnetic doorway (2)

Dr. Evil (3501) | more than 13 years ago | (#413747)

Yeah, I can just imagine it now.. some fellow carrying a server walks out of the room. In doing so, some shoplifting-type sensor picks up this little detail, discharging an arc-welder into a thick coil wrapped around the doorframe.

The fellow notices a loud "wooosh", kind of a rapid tinkling as wiring squeezes about the doorframe and shifts in its mountings, fine ferrous dust immediately sucks towards the extremeties of the door, instantly forming a fine iron fur. All zippers, key rings, watch springs, and other iron sundries jolt imperceptably. The case of the computer is torn through inches of open space and slammed into the door frame. Anybody within 30 yards with a pacemaker dies instantly. The hard drive jumps as its magnets align to the strong magnetic field.

Then great capacitor in the arc welder fades, and only the smell of melted insulation and positive ions is left in the air.

I bet the data would still be intact... if not, easily recovered using advanced techniques. A uniform magnetic field would probably leave the ferrite in a predictable alignment... anything which isn't is part of the old data structure.

Encryption and writing random data acros the drive would probably work better. Maybe even mounting a coil near the platters then using a garage-door-opener type device to trip a battery inside the case to send crazy fields through the platters.

Re:Then again... (2)

SuiteSisterMary (123932) | more than 13 years ago | (#413748)

Can you take that chance? Even thirty contiguous bytes can give you a username and password.

Re:Data destruction 101 (2)

PhilHibbs (4537) | more than 13 years ago | (#413749)

3. Overwrite all your data with a good random or pseudorandom stream of data.
I think creating a stream of plausable-looking data, ie. with a similar bit distribution to the original data, would be better. If you overwrite with random data enough times, the original data may become partially visible therough statistical analysis.

Re:securely wiping drives (1)

DrQu+xum (218745) | more than 13 years ago | (#413750)

Also from Norton; gdisk, part of the Norton/Symantec Ghost suite, supports wiping from 1 to 99 passes.

Or if you don't mind waiting...reformat your system and put WinME on it -- it'll be completely trashed in about a month or so. :)

Thus sprach DrQu+xum.

Re:you REALLY wanna scre it up? (1)

dentyou'reajerk (318454) | more than 13 years ago | (#413751)

Sans Education and Research Organization

Is it just a coincidence that sans means "in the absence of?"

Re:Erasing a Hard Drive (1)

stilwebm (129567) | more than 13 years ago | (#413752)

Well, there isn' really a tool necessaryily, but you can try this:

dd if=/dev/random of=/dev/sda

You could of course adjust it to repeat the process with a shell script.

You can't overwrite everything easily (1)

Pachooka-san (88633) | more than 13 years ago | (#413753)

Some time back, I was sysadmin for a project that generated a number of SECRET classified hard drives. They were perfectly good, large, and totally unusable. The difficulty in preserving the physical integrity was that although disk wipe software existed, it didn't overwrite every block. Remember, for a standard SCSI disk (and IDE too, I believe) there are "hidden" spare blocks (not visible to standard operations) - they are used to replace bad blocks by the drive controller. Any real disk overwrite utility had to overwrite all of those blocks too, which are generally accessible only through manufacturer-specific operations and damaged, so writes didn't work correctly. Then you had to demonstrate to a technically unsophisticated, very skeptical security officer that you really did erase everything. Couple that with the many passes (hours and hours worth) required by overwrite utilities and it translated to more hassle (read labor hours) than the government wanted to spend, just to recover the use of a hard drive - cheaper to physically destroy it. Nothing particularly exotic, just a sledgehammer (but it was so satisfying...).

The smart user uses encryption. (2)

Anonymous Coward | more than 13 years ago | (#413754)

The difficulty of erasing data from a hard drive is a very good reason for using encryption to store your data. By simply storing all your data in encrypted form, removal of the key to your encrypted data will erase all of it. For instance you can keep your key on a floppy disk or by remembering your key (although most keylengths you can remember seem to be crackable these days). In the floppy disk case, you simply destroy your floppy and the data on your hard drive is gone forever.

Look at www.kerneli.org [kerneli.org] for information about how you can encrypt your hard drive on Linux. Other tools exists too.

Re:Simple! Follow these three steps: (1)

stilwebm (129567) | more than 13 years ago | (#413755)

Glad I wasn't the only one thinking of this idea! It sure worked for me. Soon after I got a warranty replacement, I was able to repeat the process EVERY TIME!

Re:Big ass magnet (1)

dstone (191334) | more than 13 years ago | (#413756)

I've done it before, works like a charm.

And how did you confirm that the data was fully wiped?
By doing something more than double-clicking on the C: icon in Windows Explorer, I hope!

Details, man! Need details!

Bulk Erasers (1)

gavinhall (33) | more than 13 years ago | (#413757)

Posted by polar_bear:

I didn't see this in any other comments...

Radio stations typically use a hand-held "bulk eraser" that's basically a big magnet to wipe clean tapes and such. We had a used hard drive in the station that I bulk-erased and it certainly seemed to get rid of all the information - and it still worked. Had to reformat it, but it worked.

You can probably purchase a bulk eraser for around $100 or so.

Re:The smart user uses encryption. (1)

Aaton (216314) | more than 13 years ago | (#413758)

I currently uses BestCrypt [jetico.com] for linux. Its really easy to install. But is not Rubber Hose proof!

Taken off the http://www.rubberhose.com/ [slashdot.org]

Rubberhose transparently and deniably encrypts disk data, minimising the effectiveness of warrants, coersive interrogations and other compulsive mechanims, such as U.K RIP legislation. Rubberhose differs from conventional disk encryption systems in that it has an advanced modular architecture, self-test suite, is more secure, portable, utilises information hiding (steganography / deniable cryptography), works with any file system and has source freely available. Currently supported ciphers are DES, 3DES, IDEA, RC5, RC6, Blowfish, Twofish and CAST.

For thoses that don't know about the software you can read about it here [rubberhose.org] .

PS:I never post to /. This is a first! back to getting the new /. DB built...

Algorithm for Memory (1)

Brian_Ellenberger (308720) | more than 13 years ago | (#413759)

Hmmm, this sounds alot like the algorithm for how memory works in our brain.

Re:Data destruction 101 (2)

thogard (43403) | more than 13 years ago | (#413760)

Flight recorders used to use a metal wire that would run in an endless loop as its "tape". It was common in the 1970s to be able to read 6 generations of recordings off of them.

Re:Some thoughts... (2)

thogard (43403) | more than 13 years ago | (#413761)

You don't know what a modern drive will do.

We got some brand new 1 Gig IDE drives in a few months ago. They look like 10 gig drives but they claim 1. maybe they have 9 gig worth of bad sectors or maybe they have 9 gig worth of sectors that can be remapped.

When a modern drive is told to put a sector at a specific location, its going to do its own mapping and if its detected an area of the disk is going bad, it will put the new data someplace else leaving the old data there where you can't delete it as a user.

Really erasing a disk (1)

TrentTheThief (118302) | more than 13 years ago | (#413762)

The only non-destructive method that works well is a bulk tape eraser. A tape eraser contains a very weighty coil that generates an extremely strong magnetic field.
When I was in the Navy, that is what we used to erase hard media that contained TS information. The thing had a warning about not wearing a watch, using it near anyone wearing a pacemaker, or using it within 10 feet of any media that you didn't need to erase.
Laying that puppy on top of a hard drive for half an hour will randomize it _quite_ well. I don't want to make any guarantees about the drive electronics, though. So proceed at your own risk.
You can probably find one at a place that handle commercial video. Try the Yellow Pages.


Sand Paper (1)

Llama Keeper (7984) | more than 13 years ago | (#413763)

My College roomate worked for the Airforce as a computer guy while he was in college. They had a harddrive on a topsecret machine go bad. Before they could send it in to Seagate to get a replacement they took the cover off the drive and sanded the platters with a rotary sander. I am pretty sure all that data was erased.....

Erasing a Hard Drive (1)

Clubber Lang (219001) | more than 13 years ago | (#413764)

Granted I'm no expert on hard drives at a purely hardware level, but I don't think this would be that hard to do.

Start with the usual re-partition and reformat so you have a completely blank drive. Then completely fill up the drive with essentially meaningless crap, white noise. Then reformat again to blank it. All data should be completely gone.

Something like Eraser [tolvanen.com] should do it I'd think. Granted it's for windows, but I'm sure there'd be a Linux or BSD equivalent somewhere.

its easy.... (3)

ndfa (71139) | more than 13 years ago | (#413765)

right click on the drive and choose format, quick format is nice and fast!!!


There is no 100% sure way to destroy data. (2)

meldroc (21783) | more than 13 years ago | (#413767)

Several wiping programs are available that will overwrite data multiple times with binary patterns - checkerboards, solid 0's, solid 1's, random patterns, etc. Even after all of that, it is still possible for an organization with lots of resources such as a data recovery service or a three-letter agency to recover the residual remains of the data, though it would be very difficult.

The only sure way to eliminate the data entirely is to completely destroy the media. Sandpaper on hard disk platters or CD-Rs (the top side, make sure you sand off the silver and dye layers) works, incinerating also works. Be careful. I saw a case where a suspect tried to destroy a floppy disk with incriminating evidence by cutting it up with scissors. The FBI was able to put the disk back together like a jigsaw puzzle and recover the data. Make sure there is nothing left of the recording surface.

It all depends (1)

eXtro (258933) | more than 13 years ago | (#413768)

There isn't a cut and dry answer in my opinion. It all depends on the data you're trying to destroy. The more undesirable the outcome if the data escapes the greater the lengths you've got to go to obliterate it.

If you're a newlywed and getting rid of your vast pornography collection a format is probably sufficient. Rewrite over the data with a random pattern if you're paranoid your new wife will use Norton Marriage-Breaker 2K1.

If you're dealing in contraban, whether the contraban is on the harddrive or the harddrive just contains incriminating evidence, destruction of the device would be your best bet. Remove the platters, stick them in the microwave for a few seconds (mostly just for the fireworks), sand them, sand blast them and melt them.

Just like cryptography the lengths you should go to depend on the difficulty in going to those lengths, the probability that those lengths can be compromised and the cost if those lengths are compromised.

This company does just that (2)

Diffraction (70861) | more than 13 years ago | (#413769)

Blancco Ltd. [blancco.com] is a company that sells piece of software that erases your hard drive permanetly. It is based on Septem OverWrite method that they have developed which seems to consist of overwriting the data seven times with random data. They claim that it is impossible to recover the data but the hard disk is still usable. See the Brochure [blancco.com] and decide for yourself if it makes any sense.

No, I don't work for them, they are just located a few blocks away from where I live.

How we did it in the Marines - 1989 - 1993 (1)

Mr. Foogle (253554) | more than 13 years ago | (#413770)

wipedisk - old Norton applet writes 1s and 0s to the disk in alternate patterns. Read more below.

I can't speak for how it was done other than 1990 - 1993 .. I was enlisted with an MOS (Military Occ. Speciality) of 4063 (programmer) with a secondary MOS of 4066 (small systems specialist). Oddly, I never programmed, and spent all of my time as a PC specialist and LAN guy.

Norton (pre buyout) had a nice tool called wipedisk. Put this on a bootable floppy, set it in the autoexec.bat to execute and let it go to town. The app wrote 1 and 0 in alternate patterns to every byte on the drive.

If memory serves, our standards were to write in 1s, then 0s, then 1s again. This was standard practice for all drives that held classified data, including the unix servers (long story behind THAT bit o' weirdness).

Destroy the drive (1)

dead_penguin (31325) | more than 13 years ago | (#413771)

Others have already suggested it, and even though you're looking for a method that will keep the drive intact and usable, I think the best way is to completely annihilate the drive. With drive prices being as low as they are, it'd probably be cheaper and more secure to do this occasionally than it would be to invest in software to do it, and still not be sure that the data *really* is gone.

Answer depends on your threats (2)

coyote-san (38515) | more than 13 years ago | (#413772)

Like all questions with security, the answer depends on your threat. Ensuring data isn't recoverable by your spouse or parents is very different from ensuring it isn't recoverable by a TLA.

PARENTS: <code>dd if=/dev/zero of=/dev/hdc</code> will make the disk appear empty to anyone who uses the standard access hardware.

TABLOID JOURNALISTS: you'll probably want to use one of the multi-pass programs. Civilian data recovery sites might still be able to pull up the data, but multiple writes (properly done) will make it expensive enough to discourage most people. If the material is sufficiently sensitive (e.g., you're protecting medical records of celebrities and the tabloids have been caught dumpster-diving) you might want to proceed to the next step.

TLA: big vat-o-acid to dissolve the platter. Forge to heat the platter to melting temperature, or at least hot enough to completely scramble all magnetic domains. Heavy duty sanders, again producing enough heat to scramble any magnetic domain that survives the abrasion and magnetic fields in the motor.

ALL: don't forget that data rarely exists in only one place. It's a waste of time to carefully scrub hard disks, yet toss backup CD-Rs into the trash as-is.

How to destroy anything... (4)

chipuni (156625) | more than 13 years ago | (#413773)

Give it to a five year old. They can destoy anything .

Some thoughts... (2)

jd (1658) | more than 13 years ago | (#413774)

None of these are guaranteed to be 100% effective, but they're probably better than doing nothing.

  • Low-Level format the drive. No, that's NOT the same as a typical user-land format. We're talking actual hardware-level. This is usually not done on hard drives, simply because it has a tendancy to mangle them.
  • Place the drive in a variable, high-power magnetic field. Ideally, the magnetic field should be comparable to those used in linear accelerators. You -DON'T- want a constant field, though, unless you want the drive permanently magnetized, rendering it useless.
  • Smash the heads against the buffers, repeatedly, until they're no longer aligned with where they were. Don't go too far, or you'll lose the heads altogether.

Data recovery companies (2)

Hall (962) | more than 13 years ago | (#413775)

I went to www.ontrack.com to see if, by chance, they had a FAQ like "Can I erase my data to the point that even you can't recover it ??". Didn't find it, nor did I look very hard, but did find this faq [ontrack.com]

No Need to! (3)

Smitty825 (114634) | more than 13 years ago | (#413776)

Here is a fool-proof method to keep people from even wanting to read your data:

For the next week, take all of the Trolls posts on Slashdot and store them in random places on your harddrive where the data needs to be destroyed. Anybody who trys to read that data would get so sick of reading "Frist Post", "wh00p", "pron" & "3133t h4x0r" and seeing lots of nasty goatse.cx links that they would immediatly dispose of the hard drive without getting any sensititve material

I guess that method wouldn't work if you were a troll trying to cover your footsteps, though! :-)

Re:its easy.... (1)

Mr. Foogle (253554) | more than 13 years ago | (#413777)

it *must* be a slow day at Slashdot.

format just really seems to make the data go away, but it's still available w/ the right tools - just like deleting a file doesn't really make it 'go away' but removes the first letter of the file name, making the space available to the OS (okay, okay, that was how it is/was under FAT16) I'm sure other file sysetm types are similar.

This won't work. (3)

Wakko Warner (324) | more than 13 years ago | (#413778)

In order to truly erase a drive, for good, you need to wipe it dozens of times. There are data recovery centers that can recover files on drives that have been written to (i believe) 8 or 9 times after a file has been deleted or a disk has been formatted, so if you're not going to damage the surface of the drive, you're going to need to format like crazy, and fill it with junk every time.

- A.P.

* CmdrTaco is an idiot.

Now you did it (4)

JediTrainer (314273) | more than 13 years ago | (#413779)

All of you who said that no matter what, data can't be erased, gave me an idea.

Unlimited storage.

That's right. Every time you need more disk space, simply delete something not used in a while, then overwrite it with a new file. Need that old file back? Great - have the filesystem automagically run a recovery on it. Put it into the kernel, and we've got blackholefs.

The end result is a bottomless pit of unlimited drive space :) Even more interesting is that the files you use the least may eventually become unrecoverable and forgotten over years, lessening the need to clear out your clutter. Files that you haven't used in a while might take a bit of time to come up, but you usually won't mind the wait. Stuff you use all the time will always be available. So how about it, kernel hackers? And my sig's appropriate this time around, too!

(and yes, I am joking, but if someone can think of a way to really do this them I'll REALLY be impressed!)

Re:Sand Paper (1)

Beowulf_Boy (239340) | more than 13 years ago | (#413780)

Impossible, the platters of a Hard Disk are about the density of Card-board

Data destruction (2)

Terri416 (131871) | more than 13 years ago | (#413781)

There are two scenarios: with disk reuse and without. Without disk reuse, you simply destroy the magnetic material by raising it well above the curie temperature for a long time. A conventional gas or electric oven (NOT a microwave) will do the job fine, just remember to pierce or open the casing to avoid an explosion! The weakness of this is that the bad guys can still find the dead drive and get suspicious. You could use thermite or other thorough destruction method, but that can leave evidence that's even more suspicious. A domestic oven is a very innocent degausser. If you want to keep the use of the disk (you might have a regime of regular data shredding - weekly, maybe) then you have to accept compromise. Although you won't have to explain the molten pool of metal, your disks will still retain the secure deletion software, so that might need explanation. Also, for technical reasons, there is NO WAY to guarantee complete destruction of all data. You can make it difficult to recover. You can make it so difficult that it isn't worth they're making the effort, but they just might get lucky and recover something important. It's a matter of a trade-off. One method is to use encrypted loopback devices to store the data in the first place. Just change your password (which you NEVER wrote down) and they'll have to break AES to recover it. This is quick and easy, just give the device the new password and store something innocent in it and hand the new password to the baddies. Destroying plain text is difficult, destroying encrypted data is not so bad. Just a thought.

Other techniques (5)

satch89450 (186046) | more than 13 years ago | (#413782)

Lawrance Livermore used to take decommissioned hard drives and Syquest style media in the green area and dump the platters into a vat of acid. Floppy disks went through the three-pass shredders, so you end up with fine magnetic dust.

The original specification for overwriting disks containing classified but not secret data called for 300 overwrite passes, alternating between all-zeros, all-ones, alternating zero-one, alternating one-zero, and "worst case pattern" (for those old MFM drives, the 16-bit pattern 0xDAC3). You needed to know the exact drive geometry, because you want to do all the tracks on a platter individually, using a back-and-forth sweep so as to get into the guard bands as much as possible.

(In other words, wipe from cylinder 0-max on head zero, then from cylinder max-0, then go to the next pattern and wipe. Then you go to the next head.)

Is it worth it? At today's prices, I don't think so.

Re:Hysteresis is your friend. (2)

Detritus (11846) | more than 13 years ago | (#413783)

Where I work, we have a tape degausser that is powerful enough to erase all of the credit cards in your wallet and stop your heart pacemaker if you are anywhere near it while it is in operation. It still isn't powerful enough to erase high coercivity media to NSA standards.

Re:YAST (1)

CritterNYC (190163) | more than 13 years ago | (#413784)

Know where I can get one of those??

Re:This company does just that (2)

Fillup (121335) | more than 13 years ago | (#413785)

There is a little hacker tool called "Burn" [staticusers.net] that has been out for the mac for like 5 years (i know i know, nobody here uses a mac....)

Burn is a file-deletion utility that does what this poster just described---you can set the pattern (0000, 1111, or maybe 1010101)---and the number of passes it makes. Highly configurable.

Also has a command to "erase free space" on the hard drive---same options as the file deletion, only it cleans all the os-marked "free space."

I did this once (2)

scorbett (203664) | more than 13 years ago | (#413786)

Several wiping programs are available that will overwrite data multiple times with binary patterns - checkerboards, solid 0's, solid 1's, random patterns, etc. Even after all of that, it is still possible for an organization with lots of resources such as a data recovery service or a three-letter agency to recover the residual remains of the data, though it would be very difficult.

About a year ago I worked for a company (which shall remain nameless) that tasked me with writing a secure disk wiping algorithm. I did a little homework, and found that the US Department of Defense had a recommended 7-pass algorithm. A little more homework, and I discovered a crypto guru named Peter Gutmann [auckland.ac.nz] who had a 35-pass algorithm. I implemented both of those, and then took it a step further and allowed the user to create a custom wiping algorithm, up to 99 passes (I figured any more than that would probably be overkill). We had a professional cryptographer on staff who assured me that even after 99 passes of overwriting the data on disk with different patterns, the NSA or some other such agency could still recover the data if they wanted to badly enough. I had my doubts, but then I've never ventured into the field of electron microscopy.

Anyway, the project was killed due to management/marketing cluelessness, so we never actually shipped it, but it sure was educational to implement. I had been under the impression that simply overwriting a file even once with 0's and 1's would be enough to render it unrecoverable, how naive I was.


Re:YAST (1)

SEWilco (27983) | more than 13 years ago | (#413787)

I do not know. Mine is from a 1960s disk drive that was nine feet tall, had two stacks of twelve platters, and used hydraulics to move the heads. It did not have much capacity, but it had a good transfer rate due to reading 12-bit words off all 12 platters in parallel. Support for them got very expensive around 1980 so they probably all vanished around that time, and that was when I got mine.

Simplest Idea (1)

onosendai (79294) | more than 13 years ago | (#413788)

AFAIK standard procedure for local law enforcement/military in Sth Australia is to utterly physically destory the drive (crush it, melt it ...) then BUY a replacement.

Like some other people have said, it's much cheaper and securely reliable to destoy and replace the HDD, at least that way they can't cause a national security problem by loosing them behind photocopiers (see the Los Alamos incident late last year) ;)

Re:Data destruction 101 (1)

AnteTempore (19961) | more than 13 years ago | (#413789)

You can erase the drive with software. But the reason why you can recover data from a drive erased with software is magnetization creeping.

The magnetization starts out as a narrow track with a high signal to noise ratio. If the magnetization is not altered it will slowly spread out from the narrow track.

You might want to think of it as a hill of sand: over time the hill will be worn down and spread out, but it will still be a hill.

If you have written something a year ago the magnetization will have spread some. If you overwrite the data today then it will be possible to read the one year old data by reading just beside the track. If you overwrite the new data tomorrow it will still be possible to retrieve the 1 year old data, but it will be significantly harder to retrieve the data written yesterday.

So: while it does help to overwrite data several times, it is still possible to retrieve data that has been on the drive for long.

If data is only altered once a year, it will be possible to retrieve the individual years. I think IBAS [www.ibas.dk] is capable of recovering up to 6 generations back. As you might expect this is not cheap.

Re:The smart user uses encryption. (1)

Nohea (142708) | more than 13 years ago | (#413790)

Good one! Don't answer the wrong question, answer the right one: "how do i prevent others from reading my data?"

If everyone remembers, Kevin Mitnik's encrypted hard drive [slashdot.org] was in the possession of the FBI for years, and they couldn't get the data off it.

Re:How about Something Different (2)

b1t r0t (216468) | more than 13 years ago | (#413791)

Then it was either Flash or had a battery built into the module.

Hard Drive secure delete ? (1)

bolix (201977) | more than 13 years ago | (#413792)

Strikes me that mechanical media may not suffice in high secrecy operations. You'd be better off to run a solid-state drive with no battery. With a relatively innocuous label "accidental" erasure would be guaranteed. Secrecy is always perceptual - preventing physical access or high strength encryption would be much more efficient methodology.

Re:Erasing a Hard Drive (1)

SlashGeek (192010) | more than 13 years ago | (#413793)

I realize that from this story is not so much about security as it is science, but honestly; unless it's a 80gig 15,000 rpm Ultra160 SCSI HD that's $1200 to replace, if you have anything THAT sensative that you MUST destroy the data, just destroy the drive. If it is that big of a deal what is on the drive, a $140 drive is probably not worth the effort. Better yet, if it's that important, just don't do anything that would piss off a 3 letter agency.

"Everything that can be invented has been invented."

Use Shred from GNU Fileutils (4)

mojo-raisin (223411) | more than 13 years ago | (#413802)

GNU fileutils has a program called 'shred' that writes over a harddrive ~30 times in a way that makes data recovery ~impossible. I have two drives in my Linux box. What I do is mount the one I want to wipe out as ext2. Then

shred -z /dev/hd[a,b,c or d]

It takes ~6-8 hours to wipe out a 10GB drive.

Re:There is no 100% sure way to destroy data. (2)

Tower (37395) | more than 13 years ago | (#413803)

Well, if you are going the sandpaper route, you might as well drop the platters (or the whole drive) in some nice strong acid, or possible a smelting furnace... that should take of it.


Re:How we did it in the Marines - 1989 - 1993 (1)

crovax (98121) | more than 13 years ago | (#413804)

The general military standard, as I recall, is to place random 1s and 0s eleven times over the unwanted data. I believe I saw this on a TLC or Discovery program on cyber warfare.

Spelling by m-w.com [m-w.com] .

Another guaranteed way... (2)

davejhiggins (188370) | more than 13 years ago | (#413805)

... is to run the Win95 installer program on it. Guaranteed to erase all data, ext2 partitions, hpfs partions, mbr, everything.

No special configuration options needed, and in many cases technically counts as overwriting with totally random data. :)


Data destruction 101 (4)

rjh (40933) | more than 13 years ago | (#413806)

  • The naieve way

    Delete your files. This will keep a six-year-old from recovering them. If you're running a UNIX which doesn't have a recycling bin, nor a broken file system which still leaves data lingering intact long after "deletion", then you'll be able to keep a seven-year-old from recovering them.

  • The cryptographic way

    Follow the following procedure:
    1. Overwrite all your data with 0xFF.
    2. Overwrite all your data again with 0x00.
    3. Overwrite all your data with a good random or pseudorandom stream of data.
    4. Repeat this process at least seven times--more if you like.

  • The smart way

    Follow the cryptographic method outlined above. Then get out a sledgehammer and physically destroy the drive. Drop the platter in a metal wastebasket, douse it in lighter fluid and set the thing on fire. Don't stop until the platter is totally destroyed.
... All this may sound overly paranoid, but if your data really is that important it's the only way to go. A new hard drive is $250 nowadays; the cost of important secrets getting out is easily a few orders of magnitude higher. Physical destruction of media is the only way to be fairly certain that the data is destroyed.

Keep in mind that the cryptographic method may fail, and even a bulk degausser isn't guaranteed. They can do amazing things with electron microscopy today.

dd, the helpful tool :) (1)

toast0 (63707) | more than 13 years ago | (#413807)

dd if=/dev/urandom of=/dev/(h|s)da

do that several times... if you're really paranoid you can use /dev/random, but it will take longer (because you'll have to wait for entropy)

you REALLY wanna scre it up? (1)

CyberQuog (67799) | more than 13 years ago | (#413808)

Use the hard drive killer from Hackology [hackology.org]

It's software for windows, but this shit is crazy, it will physically damage the drive. If you use something like Blowfish Advanced CS [www.bsn.ch] to wipe the drive of everything and clear the free space with a 30x write, and then use the Hard Drive Killer, and then maybe open the drive and put the pladders in a blender, it'd be damn near impossible for anybody to get anything.

Yet another yarn (2)

Zerth (26112) | more than 13 years ago | (#413809)

In the USAF about 20 years ago, usual process for the drives with the 2' platters was just to sand them until they were dull and then sand them until they were nice and shiny again. Then take a vise and a hammer and bend them in half and then half again. I've still got one on my wall(it is /such/ a pain to unbend those things:)

Cryptonomicon: magnetic doorway (1)

lil_billy (25771) | more than 13 years ago | (#413810)

In Cryptonomicon the guys are so paranoid that they have the doorway to the server room setup as a magnetic "trap"... if someone leaves with the disks, they're erased with no effort.
Good book.
PGP comes with a disk wipe utility... will wipe the hard drive anywhere from 8 to 256 times.

Military methods (2)

ptomblin (1378) | more than 13 years ago | (#413811)

Many years ago, I read about how the military destroys hard disks that have contained highly secret data. (I believe this was in comp.risks or sci.military). The procedure was as follows:
  • overwrite the disk using something like Norton "wipedisk"
  • take the disk under armed guard to a secure facility
  • use thermite to melt the disk into slag. If any slag still looks like a recognizable part of a hard disk, use more thermite.
  • bury the slag.

Now that's secure.

Re:How about Something Different (2)

coyote-san (38515) | more than 13 years ago | (#413812)

Memory is recoverable from DRAM/SRAM for some time. Not trivially, but it takes a long time for the electron density in all of the cells to return to a statistically meaningless state.

An excellent example of this was the recent Concorde crash. I recall reading a little blurp about how it used a solid state memory data recorder which had lost power... yet the investigators were still able to extract most of the information from it.

Re:Military methods (2)

David Gould (4938) | more than 13 years ago | (#413813)

The version I heard floating around was a somewhat urban-legendish-sounding story of <some vendor, possibly Norton> trying to sell <some product, possibly "wipedisk"> to <some security-paranoid gov guys, possibly the military, Lawrence Livermore Lab, etc.>. The military (or whatever) guys listened politely to the vendor's pitch, then said "That's nice, but let me show you how we destroy classified data..." and led them over to where they had set up some sort of guillotine thing, put a drive in, and chopped it in half; the message was "we don't need no steenkin' software -- if it's important, we can afford a new drive"; the vendor was suitably chagrined, etc...

Of course, the guillotine thing wouldn't be nearly as effective as the various other versions already posted (acid bath, thermite, etc.), which for that reason sound much more probable, but it's interesting that someone would have said it that way -- I guess to the less-imaginative, the guillotine makes an easier image (embellish the story with loud noises, pieces of platters and arm assemblies flying around, etc.) To me, the acid bath / thermite sound more impressive, but maybe it takes a little more sophistication to visualize. The embarrasing-the-vendor part seems extraneous, especially as it assumes the vendor would have failed to know better.

David Gould

Re:A Slow Day at slashdot (1)

Aunt Mable (301965) | more than 13 years ago | (#413814)

Fucking moron. And Troll. Probably.

When you write to a hard-drive consider it like leaning towards 0 or 1 rather than flicking to a binary position. It's read off the platter to be 0 or 1 if it's nearer to one point than it is the other.

If it's been written to a million times as '0', then you write once as '1', it will be only be most of the way towards '1' but not as far as if it were originally written '1'. It's read off as binary but the universe is analogue.

Using this information (and other certainly more complex ideas) you can estimate the previous data, often up to eight generations ago.

To really erase the data you can write randomly to it many times (KDE's filemanager offers a scramble option which write randomly a dozen times - or something), which may suffice for most things.

However randomly writing data isn't the best, apparently. There are certain writing patterns shown to more quickly wear the result down than random (they probably take into account the original value and try to counteract that).

In conclusion, fuck you. I post at 0 too.

-- Eat your greens or I'll hit you!

destroy and dispose (1)

-siriux- (317721) | more than 13 years ago | (#413815)

3 steps:
1. grind the platters on a bench grinder
2. cut the destroyed platters into several pieces with a cutting torch.
3. launch the platter remains in a series of picosats

Re:Some thoughts... (2)

unitron (5733) | more than 13 years ago | (#413816)

A "low-level" format on a modern drive probably won't really low-level format it, especially if it uses some sort of servo information track or tracks that the drive's electronics are programmed to not overwrite. The factory can use a much more expensive machine to write sector markers with a much stronger magnetic field than can be generated by the heads that the drive ships with. Running a low-level format program that only uses the drive's own heads and electronics can possibly refresh some sector markers that are starting to fade magnetically but they probably won't write new ones anywhere where the old ones weren't.

Re:Another guaranteed way... (2)

unitron (5733) | more than 13 years ago | (#413817)

But then you've got Win95 on it, and the idea is to leave it usable.

Destroying your drive is the only option! (1)

mrowell (31242) | more than 13 years ago | (#413818)

See "Secure Deletion of Data from Magnetic and Solid-State Memory" [auckland.ac.nz] by Peter Gutmann, Department of Computer Science, University of Auckland for the Sixth USENIX Security Symposium Proceedings.

securely wiping drives (1)

Anonymous Coward | more than 13 years ago | (#413819)

The definition of wiping drives properly, like other security related matters, depends on what adversary you are trying to protect the data from. If your adversary is a coworker, shred ( gnu fileutils (older) [gnu.org] or gnu fileutils (newer) [gnu.org] ), wipe [sourceforge.net] , or norton utilities wipeinfo (see Norton System Works [symantec.com] , you might have to get the professional edition to get wipeinfo) might work. For adversaries that have more funding and/or time, purchasing sanitizer [sanitizer.com] is advisable as its "D" version meets DOD requirements for electronically disposing of classified and sensitive data on a hard drive. It can apparently defeat electron microscopes with spin control, when properly utilized. Note that if you're going to this extent you probably want to TEMPEST shield [shmoo.com] (and here [google.com] and there [tscm.com] ) your life, and start using crypto sytems that keep the key material in FIPS 140 [nist.gov] compliant crypto devices like these. [chrysalis-its.com]

Back in the days... (2)

MongooseCN (139203) | more than 13 years ago | (#413820)

Crackers used to use a coil of cables wrapped around the harddrive and hooked up to a 120V outlet and a lightswitch. Then if someone came into the house to confiscate the computer and hit the wrong light switch when entering the room, the 120 volts through the coil of cables would generate a massive electo magnetic field that would wipe out all the contents of the drive and be completely unrecoverable. Of course you might have a lot of melted wires on the drive too.

Re:Sand Paper (1)

Llama Keeper (7984) | more than 13 years ago | (#413821)

E@teme dude,

Have you ever opened an oldschool (Full Height) Seagate drive? HMMM Nope? Well they are not quite the density of cardboard.... and let me rephrase that.... put platters on chuck of drill and sand.

Low level format (1)

suraklin (28841) | more than 13 years ago | (#413822)

Use a program called Troubleshooter that has various utilities including a low level format utility. Or do an internet search on loformat.exe, this is a western digital ide low level format utility(it works for all ide drives)

Re:Yet another yarn (1)

AtrN (87501) | more than 13 years ago | (#413824)

At a large place I worked at the auditors forced us to use sledgehammers on the disk packs. It's a lot of fun.

YAST (1)

SEWilco (27983) | more than 13 years ago | (#413825)

Yet Another Security Threat: Souvenir Keepers.

(I do have a three-foot-diameter magnetic disk platter. Nice coffee table top.)

Load More Comments
Slashdot Login

Need an Account?

Forgot your password?