How Do I Know The Disk Has Been Fully Wiped (Privacy/Security Disk Wiper Software)

How Do I Know The Disk Has Been Fully Wiped (Privacy/Security Disk Wiper Software)

Good orientation here …… we are talking….
Data remanence
From Wikipedia, the free encyclopedia
This all depends on what and why you want to do this. If simply passing the PC on to a family member or friend and want all your data wiped off – you can use any disk wiper. It is assumed they are not going to go snooping in  some manner with a file recovery software in other words. Simply erase the disk is the procedure without security being a concern.
If you are going to donate the PC or recycle it – then you should absolutely only use a military grade disk wiper (eraser). This guarantees your data is NOT recoverable. I don’t know your sources to the contrary, but that is apparently indisputable. No data period – using military grade wiping software. That’s why it is called military grade. The best available to the public is a military grade software disk wiper. [ 35-pass Gutmann uber-paranoid erasure ]
The paranoia stops here……
(Has this been circumvented ? Not to knowledge)….
“UltraSentry was designed to delete file and folder data to United States Department of Defense standards, which is why we call it a military-grade cleaning application. What does this mean? Well, many electronic files and data are highly-sensitive or private, and when deleted, the data itself still remains on the disk, making it recoverable or accessible by anyone. UltraSentry eliminates that risk by overwriting the file data repeatedly, completely  destroying all traces of the sensitive file data, making it completely unrecoverable. The standards to which the data is overwritten are compliant with Department of Defense standards, and are the same standards the U.S. military  and government use when deleting top-secret or proprietary electronic information.”  <>
Mac PCs have this type utility built in I have read.

If you are seeking other, than I think it goes into the area of manually doing things. This is an interesting subject and I am kicking it around on some sites for information.
Of course the oldest security joke about how to never get an infection is to not plug in the computer. Along the same lines, paranoia has to enter the picture somewhere here – such as any type disk wiper can be thought to be performing a “hex dump” of the erased material to be recoverable either for the OS owner (Windows) or the Law or the actual software writer to capture any data involved as of interest for whatever reason. Paranoia can lead to manually performing the task and perhaps with a hex editor. Simply using ” 00 ” overwrite seems less than thorough enough as I have seen it recommended to use three different passes with two different sets the 00 first and last.
Learn how to effectively delete all of the data on your hard drive – and permanently
“….. Get Physical
Another brutally effective way to destroy data on your hard drive is to properly destroy the internal parts of the drive itself. There are several ways to do this, each of which requires physical methods of destruction that can be  dangerous and may expose particles or chemicals hazardous to your health. If you are not able to maintain a safe environment, do not attempt these methods. Find a qualified company to assist.
Your data is stored on the spinning platters inside the drive. It is these platters that need targeting. Popular and effective methods for destroying the platters are: 1) industrial shredding, whereby the entire hard drive is fed into a powerful automobile-sized shredder that makes mincemeat of the drive; 2) drilling through the platters a few times with a titanium drill bit (easily found at Home Depot).
Of course, if the CIA, FSB and Mossad are all after your data, you may want to
a) selectively nuke folders and files,
b) write zeros at least seven times,
c) physically disable the drive and
d) get a safer, calmer life.
Protect your Social Security number and credit card e-bills from getting into the hands of 8-Ball Ernie down at the rehab center. Do not ruin the innocence of those kids at the community center by accidentally exposing them to the  contents of your intentionally mislabeled though ineffectively deleted “Personal Budgets” folder. Make your donation of an old computer truly a win-win, good-karma situation for everyone involved. Free tools exist to perform even  the most thorough cleaning of a hard drive. Use them. ….”

New Portable – Microsoft releases Windows Defender Offline tool beta (create bootable CD,DVD,USB flash drive)

New Portable – Microsoft releases Windows Defender Offline tool beta (create bootable CD,DVD,USB flash drive)

New Portable – Microsoft releases Windows Defender Offline tool beta (create bootable CD,DVD,USB flash drive)

Microsoft releases Windows Defender Offline tool beta
The H
Users can choose to create a bootable CD, DVD or USB flash drive
Microsoft has published a public beta of an offline version of its
Windows Defender spyware removal software, formerly known as Microsoft
AntiSpyware. Using the Windows Defender Offline …

What is Windows Defender Offline Beta?

NOTES…. A big plus here is the antimalware product runs before a
bootkit can apparently, which coincides with the new security technology
in Windows 8 which unfortunately has already been cracked….

” Windows 8 Boot Security Cracked”;jsessionid=NZjzL4QedChUWf+VUz6Tyg**.ecappj02


\sarcasm\ …So Micro$oft will be passing out a free Windows Defender
Anti-Bootkit USB Drive stick and a Norton CD with each new Windows 8
purchase ? ! LOL ….sounds eerily like a Microsoft apology or the
opposite being offering the same type technology for XP users as
conceivably a bootkit can not run on Vista because rootkits can not.
Since Vista UAC has reportedly been cracked
…THEN it would seem this is indeed the next attack vector as creating
the bootkit to then circumvent Vista security to attempt running the
very first rootkit on Vista which means a payload described as a
“blended threat” <>; as
massive, is necessary, and will no doubt be tracked back by Cyber
Security agencies (FBI et al) and the antimalware industry and possibly
private citizen groups that go botnet hunting. BUT the obvious question
is hot to upload the payload to Vista ? Only those that could care less
about security or love to run Vista without UAC (turning it into a XP or
98 0r ME) are the ones that can even be infected with the payload to
even attempt to deliver the payload and attempt reports back as to how
well they did. Massive hit and miss circumstances for this ever to
become reality. Since Vista has not climbed too much above 10 to 12
percent of sales seems it would be missed by this pipe dream to date.
Still, food for thought – and I am still in the “I love my Vista” crowd
for life ! ! ! She will be most secure even over and above Windows 8.

REFERENCE …. – Vista’s UAC spots rootkits, tests find

I personally called Vista as the crown of security software for the
decade (2000-2010) as the operating system itself achieving what NO
other defense software did…..

QUOTES, which set out to find out how well anti-virus programmes
fared against known rootkits….
The answer was not particularly well at all, either for Windows XP, or
Vista-orientated products. Of 30 rootkits thrown at XP anti-malware
scanners, none of the seven AV suites found all 30, a similar story to
the six web-based scanners assessed. Only four of the 14 specialised
anti-rootkit tools managed a perfect score.

The best of the all-purpose suites was Avira AntiVir Premium Security
Suite, which found 29 active rootkits, with Norton finding as few as 18.
The anti-rootkit tools fared better, with AVG Anti-Rootkit Free, GMER,
Rootkit Unhooker LE, and Trend Micro Rootkit Buster achieving perfect
scores. The scores for removal were patchy, however, with all failing to
remove 100 percent of the rootkits they had found.

The results for Vista products were harder to assess because only six
rootkits could run on the OS, but the testers had to turn off UAC to get
even this far. Vista’s UAC itself spotted everything thrown in front of

Only three of the 17 AV tools for Vista managed to both detect and
successfully remove them, F-Secure Anti-Virus 2008, Panda Security
Antivirus 2008, and Norton Antivirus 2008.

That UAC can tell a user when a rootkit is trying to install itself is
not in itself surprising, as Vista is supposedly engineered from the
ground up to intercept all applications requests of any significance.


Emsisoft Emergency Kit 1.0 [FREE]
[Software collection]
Version – 6/8/2011
Your emergency kit for infected PCs!
Detects and removes Malware
>4 million known dangers
100% portable – perfect for USB sticks
HiJackFree and BlitzBlank included

ClamWin Portable (Antivirus, more) [FREE]
Antivirus to go…. ClamWin Portable is the popular ClamWin antivirus
packaged as a portable app, so you can take your antivirus with you to
scan files on the go. You can place it on your USB flash drive, iPod,
portable hard drive or a CD and use it on any computer, without leaving
any personal information behind.
NEWS: ClamWin Portable 0.97.1 (anti-virus) Released |

ClamWin Portable 0.97.1 (anti-virus) Released. Submitted by John T.
Haller on June 17, 2011 – 7:46pm. logo ClamWin Portable 0.97.1 has been
released. …

Microsoft Standalone System Sweeper (Beta) [FREE]
Note “beta” means it is actually still a test version with ability of
feedbacks from the community for any bugs found they need to correct. It
then is released as normal “alpha” version.
Microsoft ships free malware cleaner that boots from CD or USB
ZDNet (blog)
June 1, 2011, 10:15am PDT In a move aimed at cutting down on support
call costs, Microsoft has released a malware recovery tool that boots
from a CD or USB stick. Ryan Naraine is a journalist and social media
enthusiast specializing …

SUPERAntiSpyware Portable Scanner (Antispyware) [FREE]
Follow the instructions below to download the SUPERAntiSpyware Portable
Scanner. The scanner features our complete scanning and removal engine
and will detect AND remove over 1,000,000 spyware/malware infections.
The scanner does NOT install anything on your Start Menu or Program
Files and does NOT need to be uninstalled. The scanner contains the
latest definitions so you DO NOT need Internet Access on the infected
system to scan.

Comodo Cleaning Essentials
Comodo Cleaning Essentials is a set of portable antivirus tools
that will help you to detect and remove malware from an infected PC.

ESET SysInspector is a powerful, portable security tool that will
inspect your system’s files, running processes, Registry keys and more,
looking for and highlighting anything that could be a sign of malware.
(Makers of famous Eset NOD32 Antivirus – most awarded in history)

Norman Malware Cleaner is an interesting portable antivirus tool which
will scan your PC, detecting and removing any malware that it uncovers.

The AVG Rescue CD is a portable environment that comes with a range of
tools to help you clean up a virus-infected PC, fix hard drive problems,
and get an unbootable system working again. This variant of the rescue
CD is intended for installation on a USB flash drive. After downloading,
you should extract the archive contents directly to the root folder of
the USB drive
you’d like to use. (If you don’t have a tool that can read RAR files,
then try 7-ZIP).

CCleaner Portable
CCleaner Portable is a compact version of CCleaner that you can store on
a CD, USB flash drive, microSD, or even two floppy disks if you still
use those.

Webmaster/malware removal help
Membership/Join List:
Free Malware Removal Help / A Community Website Since 2005

%d bloggers like this: