![]() Examples of these tools include “Darik's Boot and Nuke,” “DiskWipe,” “CBL Data Shredder,” “Webroot Window Washer,” and “Evidence Eliminator.” ![]() Unfortunately, these same utilities can be used for other, less honorable purposes. ![]() Most of these applications are promoted and/or intended to keep personal or corporate information private. Drive Wipingĭrive wiping utilities are used to overwrite data on a hard drive in such a way as to make them unrecoverable. Defragmenting or reformatting a drive is frequently attempted, but often delivers limited results. Much of its effectiveness rests with the quality of the software, how it is used, and the number of “wipes” that are made. Drive wiping software is commercially available and can be effective in destroying potential evidence. ![]() Using utilities such as these can leave telltale signs of their use, providing substantial evidence even without the original data in question.ĭata destruction can be accomplished or attempted in several ways. In contrast, many drive wiping tools can be very effective. As we've seen, this approach is not effective because the “deleted” data remain on the media and are easily recovered. The uninitiated may simply hit the delete key, assuming that the data no longer exist. Actually destroying the data is a little more complicated than many people think. Sometimes hiding data isn't enough, and perpetrators try to destroy the data instead. John Sammons, in The Basics of Digital Forensics, 2012 Data Destruction
0 Comments
Leave a Reply. |