Delete sensitive data before selling old computers

Lincoln Spector

Network Administration - Anyone can use an inexpensive data recovery program to recover your recently deleted files - even if you've deleted them in the recycle bin (recycle bin ). They can also recover the hard drive that has just been formatted. Therefore, if you want to make sure that the new owner of your old PC cannot know your private information, you need to destroy sensitive files by overwriting other data.

Before choosing a program, you need to answer two questions: Do you want to delete sensitive data or the entire disk? What level of safety do you want to be at?

Deleting sensitive data files usually takes place faster, but it requires you to be more cautious and also easy to make mistakes. It also requires that you destroy all unused space on the drive because this space may still contain the remnants of older versions of your sensitive data files.

Deleting the entire drive also has its own problems. Windows computers are assumed to be owned by another owner with operating system integrity. However, if your computer has a recovery disk that you didn't lose, this is no big deal - you can destroy the drive, then reinstall Windows. In case you reinstall the operating system for your device but do not have that CD or DVD, deleting the entire drive will destroy the Windows registry that came with it.

Considering the level of security you need: Most of these programs offer several methods of data destruction, which can allow over 35 files per day to ensure that nothing can be recovered. restored. However, simple options such as one-pass, make your data difficult to access for any normal software. Cancellation by one-pass feature is also quite fast (they only take a few hours instead of a few days) and in some cases, it is cheaper.

Delete sensitive data before selling old computers Picture 1

Here are our recommendations:

If you want to delete folders or files of your choice, use an open source program called Eraser. After installing the program, just right-click the unwanted files or folders and select Erase. Click the Options button to select a cancel method.

Once the sensitive files have been deleted, open My Computer (Computer in Vista), right-click on the C: drive and select Erase Unused Space .

To delete a partition, you need to download the DOS version of Active @ KillDisk. This compressed .zip file contains an .iso file. Burn this .iso file to a CD and boot the computer from the CD to run the program.

The free version only performs a simple destructive action, but as we discussed earlier, it is a good enough tool for most ordinary users. If you really need more professional, you need to use the Pro version for $ 45.

You can delete the entire drive with Active @ KillDisk, but if you want multi-pass options and extended security, Darik's Boot And Nuke (DBAN for short) will provide those features completely. free. This tool is also an .iso file that needs to create a bootable CD so you need an iso-burn program such as ISO Recorder.

However, as a warning, DBAN will delete every hard drive it finds. Therefore it is a program that is not neglected in use.

3.8 ★ | 5 Vote

May be interested

  • How to safely delete sensitive files on Windows 11How to safely delete sensitive files on Windows 11
    when you tell windows to delete a file, you usually want it gone forever. however, some data recovery applications and services can restore those files even if you think they've been completely deleted.
  • Delete Files on Mac - Empty Trash or Secure Empty Trash?Delete Files on Mac - Empty Trash or Secure Empty Trash?
    deleting files in mac os is not a difficult matter in any way, but it can cause confusion. most people know how to drag files into the trash in the dock, but to really delete them, there are two options in the finder menu - empty trash and secure empty trash.
  • Warning: Rogue - malicious software that steals sensitive dataWarning: Rogue - malicious software that steals sensitive data
    to avoid losing your account and sensitive data, you should not click suspicious links or download apps from unknown sources.
  • How to Redact Sensitive Information in a Word DocumentHow to Redact Sensitive Information in a Word Document
    today's tipsmake will show you how to redact (permanently delete) sensitive information in microsoft word. the only way to be sure that the text has been successfully edited is to delete it, but if you need to prove this, you can replace the text with placeholders and black bars. if you don't want to replace the entire compiled text, you can also convert the word document into an image sequence. finally, both windows and mac users can use the 'inspect document' tool to remove metadata (such as author name) from documents.
  • Automatically delete data when closing Chrome, Firefox, Coc Coc ...Automatically delete data when closing Chrome, Firefox, Coc Coc ...
    current web browsers allow automatic deletion of data when closing the web browser, without the need to delete browser data manually.
  • How to delete an Apple ID accountHow to delete an Apple ID account
    apple launched data port and security, allowing you to request changes to the data shared with the company. it also allows you to delete apple id accounts and related data.
  • 10 best-selling laptops in July 201010 best-selling laptops in July 2010
    although amd computers are constantly appearing, laptops with intel processors continue to 'dominate' the list of the top 10 best-selling laptops in july.
  • How to delete all iPhone data when the device is lostHow to delete all iPhone data when the device is lost
    icloud is a valuable feature of apple that allows us to store data, manage devices remotely (search, lock, delete) easily and quickly. in the following article, tipsmake.com guides you how to safely delete data on iphone in case the iphone is lost. invite you to read along the following instructions.
  • Effective data recovery software on computersEffective data recovery software on computers
    when using data recovery software, we will find the files accidentally deleted in the folder and delete completely from the trash.
  • Hackers can steal data from the Air Gap network computer using Camera IR CCTVHackers can steal data from the Air Gap network computer using Camera IR CCTV
    recently, researchers from israel's ben gurion university have described several ways to get sensitive information from computers in this closed network.