HOME  |  NEWS  |  BLOGS  |  MESSAGES  |  FEATURES  |  VIDEOS  |  WEBINARS  |  INDUSTRIES  |  FOCUS ON FUNDAMENTALS
  |  REGISTER  |  LOGIN  |  HELP
Blogs
Blog

BlackBelt Wipes Data From Personal Devices

NO RATINGS
View Comments: Newest First|Oldest First|Threaded View
Page 1/3  >  >>
Cabe Atwell
User Rank
Blogger
Re: BlackBelt Wipes Data
Cabe Atwell   3/25/2013 2:53:40 PM
NO RATINGS
Chuck,

Most of those old devices I keep are within 20 feet of me right now. So, it is more like "try not to notice every day."

However, with programs like DOSbox, I am considering recycling the old PCs. Though, perhaps they are becoming collector's items now. My father sold all his old 12" foppy disk based PCs and such on Ebay not too long ago for quite a bit. The original boxes fetched a healthy price on their own.

C

Cabe Atwell
User Rank
Blogger
Re: Wiping Personal Devices Clean
Cabe Atwell   3/25/2013 2:48:41 PM
NO RATINGS
Jack,

DBAN is great. Running it 10 times would definitely wipe a harddrive enough so the average, and even adept, user would not be able to get data off the drive. Perhaps the NSA could get recover whatever is on there...

However, DBAN is currently not set up to use on cell phones. Perhaps in the near future.


And yes, the hammer to the drive is a good idea. Even those platter pieces could have recoverable data on them. Use this method as a last resort.

C

Charles Murray
User Rank
Blogger
Re: BlackBelt Wipes Data
Charles Murray   3/22/2013 6:18:12 PM
NO RATINGS
The trick, Cabe, is to pretend you don't notice the stuff when it starts cluttering up your basement.

Jack Rupert, PE
User Rank
Platinum
Re: Wiping Personal Devices Clean
Jack Rupert, PE   3/22/2013 4:49:12 PM
NO RATINGS
Cabe - So are you saying that DBAN isn't even that great?  Your recommendation for running it 10 times makes me a bit nervous.  I'm thinking going back to the old sledge hammer is the best approach.  (Actually, drill press, but the sledg hammer makes a better visual).

Cabe Atwell
User Rank
Blogger
Re: BlackBelt Wipes Data
Cabe Atwell   3/8/2013 4:33:01 PM
NO RATINGS
Charles,

Unfortunately, I can't just put gear in the basement, per say. After letting a bunch of old computers and laptops age from being worth a little money to garbage, I don't like to house tech anymore. I like to sell what I don't use, and buy the next new "whatever."

However, I have destroyed harddrives when I worked in medical IT. That is always an option.

PS. I still have a 286, 386, and 486 PC in storage. The computers of my youth, to be exact. Old video game consoles I can't seem to part with. A few webOS based cell phones, I just like to have as backup. So, perhaps I do follow your suggestion.

C

Ann R. Thryft
User Rank
Blogger
Re: New method?
Ann R. Thryft   3/7/2013 2:00:44 PM
NO RATINGS
Thanks for the summary, Cabe. I didn't realize how different phone data wiping was from PC data wiping, but it stands to reason.

Charles Murray
User Rank
Blogger
Re: BlackBelt Wipes Data
Charles Murray   3/6/2013 10:13:13 PM
NO RATINGS
I'm not surprised that company is doing a booming business, bobjengr. I've talked to countless people who say they're afraid to get rid of their old electronics, especially if they used them to buy something online. 

bobjengr
User Rank
Platinum
BlackBelt Wipes Data
bobjengr   3/6/2013 3:36:07 PM
NO RATINGS
Very informative post Cabe.  I do just about the same a Charles indicated in his comments:  just put the old laptops, cell phones, etc etc in the basement and buy new.  I was just made aware of a company in my home town that provides a service wiping PC hard-disks and cell phone memory.  It's (apparently) doing a booming business.  They also repair cell phones when damaged.  It's a retail establishment so I paid them a visit to see what they were all about.  I was amazed and the business they do wiping memory.   Obviously this is a definite need prior to tossing, selling or giving electronics to other people.  Great post.

Cabe Atwell
User Rank
Blogger
Re: New method?
Cabe Atwell   3/6/2013 3:04:35 PM
NO RATINGS
Ann,

The style of "wiping" a phone's data is a sensitive matter. Only user modified space can have the process applied. Some of which is in an OS or hardware protected space. IE:phone's contacts, text messages, etc. So, those areas need surgical style writing and rewriting of bits to cover over the original data. A process like DBAN will overwrite all data it has access to. DBAN, for example, may not get to all of a phone's data, in other words.

C

Elizabeth M
User Rank
Blogger
Re: New method?
Elizabeth M   3/6/2013 7:00:48 AM
NO RATINGS
Well put, as usual, Ann. That's exactly what I meant! I'm not so familiar with how the technology in general works, so would be good to know the difference.

Page 1/3  >  >>
Partner Zone
More Blogs
Enabling the Future is designing prosthetic appendages modeled more like superhero arms and hands than your average static artificial limbs. And they’re doing it through a website and grassroots movement inspired by two men’s design and creation in 2012 of a metal prosthetic for a child in South Africa.
In order to keep an enterprise truly safe from hackers, cyber security has to go all the way down to the device level. Icon Labs is making the point that security has to be built into device components.
Three days after NASA's MAVEN probe reached Mars, India's Mangalyaan probe went into orbit around the red planet. India's first interplanetary mission, and the first successful Mars probe launched by an Asian nation, has a total project cost of nearly $600 million less than MAVEN's.
Sega is releasing a new futuristic sandbox that uses height sensors and projection mapped projectors to cast pictures that correspond to what you're making.
Plant user interfaces are beginning to incorporate the consumer features such as swipe, double tap, and pinch. The driver is Millennials who expect plant equipment to match the sophistication of the smartphone.
Design News Webinar Series
9/25/2014 11:00 a.m. California / 2:00 p.m. New York
9/10/2014 11:00 a.m. California / 2:00 p.m. New York
7/23/2014 11:00 a.m. California / 2:00 p.m. New York
7/17/2014 11:00 a.m. California / 2:00 p.m. New York
Quick Poll
The Continuing Education Center offers engineers an entirely new way to get the education they need to formulate next-generation solutions.
Oct 20 - 24, How to Design & Build an Embedded Web Server: An Embedded TCP/IP Tutorial
SEMESTERS: 1  |  2  |  3  |  4  |  5  |  6


Focus on Fundamentals consists of 45-minute on-line classes that cover a host of technologies. You learn without leaving the comfort of your desk. All classes are taught by subject-matter experts and all are archived. So if you can't attend live, attend at your convenience.
Next Class: September 30 - October 2
Sponsored by Altera
Learn More   |   Login   |   Archived Classes
Twitter Feed
Design News Twitter Feed
Like Us on Facebook

Sponsored Content

Technology Marketplace

Copyright © 2014 UBM Canon, A UBM company, All rights reserved. Privacy Policy | Terms of Service