Ace, thanks Angus

Olly

--
G2 Support
Online Backups 

Email:  [EMAIL PROTECTED]
Web:    http://www.g2support.com



-----Original Message-----
From: Angus Scott-Fleming [mailto:[EMAIL PROTECTED] 
Sent: 23 September 2008 15:02
To: NT System Admin Issues
Subject: Re: Windows based secure disk eraser

On 23 Sep 2008 at 10:59, Oliver Marshall  wrote:

> Hi gang,
> 
> Does anyone have any recommendations of a secure disk erasing package
> for Windows? We currently use DBAN for erasing disks, which is fine
> where the disks are in the workstations or servers (we use it to wipe
> machines before giving them to charities etc) however, when we just
have
> a hard disk its more of a problem as we mainly use laptops.
> 
> I'm after something that will let me slap the disks in to a USB/e-sata
> caddy and then wipe them to at least DoD standards, and ideally with a
> similar number of options to DBAN.
> 
> So far the only one I can find that looks reliably...errrr...reliable
is
> Active@ KILL! (love the name).
> 
> Any others?

The Screen Savers! - Thermite PC
http://video.google.com/videoplay?docid=-4147847319296070400&q=techtv+th
ermite

I think this one might do the trick:

    Eraser | Heidi - Internet Security and Privacy
    http://www.heidi.ie/node/6

>From the page:

    Eraser is an advanced security tool (for Windows), which allows you
to 
    completely remove sensitive data from your hard drive by overwriting
it 
    several times with carefully selected patterns. Works with Windows
95, 98, 
    ME, NT, 2000, XP, Vista, Windows 2003 Server and DOS. 
    Eraser is Free software and its source code is released under GNU
General 
    Public License.    

    The patterns used for overwriting are based on Peter Gutmann's paper

    "Secure Deletion of Data from Magnetic and Solid-State Memory" and
they 
    are selected to effectively remove magnetic remnants from the hard
drive.  

    Other methods include the one defined in the National Industrial
Security 
    Program Operating Manual of the US Department of Defence and
overwriting 
    with pseudorandom data. You can also define your own overwriting
methods.  

--
Angus Scott-Fleming
GeoApps, Tucson, Arizona
1-520-290-5038
+-----------------------------------+




~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to