Data Security



One of the things that apparently is commonly overlooked in the area of computer security is what happens to the data on your hard drive when you get a new computer.

I just read an article at geoffreyhuntley.com about some old servers he picked up pretty cheap from a government auction. They were complete with hard drives and DATA and BACKUP TAPES. It’s amazing to me that ANY computer savvy person would let any machine out of a government office that had information on it.

There is a tool that I’ve carried around with me for the decomissioning of machines that can do a decent job of wiping a hard drive pretty simply. (And less muss and fuss than the disassembling the drive technique – or the bulk demagnitizer.) That tool is called DBAN (Darik’s Boot and Nuke) and it essentially boots and ummm… nukes the contents of the drives attached. DBAN can run on any x86 compatible pc with 8MB of memory and up. It also has a number of types of wiping available. Including a Department of Defense grade wipe. Now, since it’s x86 compatible only, it might not have helped with the machines mentioned in the article above (IBM RS/6000 E20′s), but it might be useful for a pretty wide group of people.

Related Posts

Blog Traffic Exchange Related Posts
  • Testing your firewall for open ports For several years now I've used a neat tool at Gibson Research to test a clients firewall quick and easy from the web browser. They have a tool called Shields Up that does a limited port scan to determine of network ports are open, closed or "stealth". One of the......
  • The basics Well to start out, this might should be crosslinked in the computer security section, but I'm putting it in commentary primarily to catch those who might not typically look at computer security. First, why should you care about keeping your computer secure? I've heard people ask something like this. Usually......
  • The biggest computer security vulnerability ever I talk quite a bit about computer viruses and computer security on this site. It's probably one of the bigger problems that I grapple with for my customers. Today I'm going to talk about the biggest computer security vulnerability there is. In fact, this is a general security vulnerability. It......
Blog Traffic Exchange Related Websites
  • How to safe guard crucial computer data? There is no denying that within today‚Äôs world, the information stored on your computer is vitally important. Companies and folks alike access various sites and applications to assist in the particular day-to-day functions that they encounter. Due to the critical nature of much of this data, it is equally important......
  • Wireless Broadband Internet-whether It Is LAN Or WAN Service-is Associated Having A Wireless broadband Internet-whether it is LAN or WAN service-is associated having a number of diverse myths. These typically center on security and need to do with anxiety about how info is transmitted over a wireless connection and, furthermore, need to do with concerns about eavesdropping, in several cases. You will......
  • Blogging and Article Marketing A web log is a collection of journal posts that follow a particular theme. These blogs are easily maintained, updated frequently, and do not require any real technical knowledge to run and maintain. A lot of blog owners work to distribute information on their favorite subject. However, many blogs are......
PDF24    Send article as PDF   

Similar Posts


See what happened this day in history from either BBC Wikipedia
Search:
Keywords:
Amazon Logo

Comments are closed.


Switch to our mobile site