How to Hide Evidence on a Computer
Method 1 of 5:
Windows
- For Windows users, if you have a folder, put it in the recycle bin and empty the recycle bin.
- If you have a browser open (Mozilla Firefox, Internet Explorer, Google Chrome), close it.
- Click Start, then click Control panel.
- Click Network and Internet then go to Internet options.
- Click "Delete" to clear up cookies and internet history. If you have a different version, then just click delete all.
- Note: Emptying the recycle bin will not completely erase the file from your system. Its still possible to recover the file. Use a file shredder to completely overwrite the file and make sure that no one is able to retrieve it.
- If you need to destroy all the information on a computer in an emergency, your best bet is to use Darik's Boot and Nuke. This will wipe a hard drive and over write the data to get rid of all possible ways of recovering data.
Method 2 of 5:
Alternative Windows
- Use the program CCleaner (freeware) from Piriform Ltd. It removes files like windows logs, temporary folder data, old prefetch data. Not even Bill Gates himself will recover anything. Set the secure erasing to Gutmann, in the preferences page.
Method 3 of 5:
Mac OS
- For Macs, if you use Mozilla Firefox open it up.
- Click Clear Private Data
- Click Clear All.
- If you have files and folders put them in the trash.
- Empty the trash by clicking finder and emptying trash.
- Click the apple icon and go to recent items.
- Click clear all.
- Go to recent folders by clicking on the go tab.
- Clear the recent folders.
- For Safari users, go to Safari--> Reset Safari--> check all that apply. This operation cannot be undone.
Method 4 of 5:
Alternative Mac OS
- Go to disk utility, choose the OS and click the erase tab.
- Click Erase Free Space.
- Click Either 7-Pass Erase of Deleted Files or 35-Pass Erase of Deleted Files.
- This means that your computer will erase all the free space and overwrite the date by adding 0's seven or 35 times making deleted files unrecoverable. 7 times is considered DOD (5220.22-M) sufficient and 35 times is considered impossible whatsoever. (Gutmann method). If the government seized your computer, and you used the Gutmann method before it was seized, given the time and proper equipment(which costs thousands of dollars), they would only be able to recover bits and pieces of the data but not the whole data itself. This includes CIA, FBI, National Security and other government agency that cannot fully restore the data.
Method 5 of 5:
Linux
- Open console and type shred file_to_delete. Shred will overwrite the file content many times, making it near impossible to recover even by the most experienced hackers.
- shred also works with hard drives (shred /dev/hdc, for instance). Shredding the hard drive is a long task, so be sure you have enough time. Also, be sure you are shredding the correct drive and partition.
- Never use any "user friendly" tool like file manager to delete the secret information. Files, deleted with such programs, can usually be easily recovered by the specialist even after a long time.
4 ★ | 1 Vote
You should read it
- Learn about the Write Zero method
- What is the Schneier (Data Sanitization) method?
- What is Data Sanitization? Are there any Data Sanitization methods?
- How trojan pretends to be a PDF file using the RLO . method
- Learn about the method of clearing DoD 5220.22-M data
- Learn about the NAVSO P-5239-26 method
- What is the HMG IS5 method?
- How to Make a File Read Only
May be interested
- The Mexican government announced the evidence that people used to communicate with aliensrecently, the mexican government has published a series of writings and images discovered in the calakmul ruins that are believed to be evidence that the mayans used to communicate with aliens.
- Types of data hiding in Excel - Hide pictures, graphs, rows, columnstipsmake introduce to you part 3: how to hide photos, graphs, drawings, lines, columns in excel
- This Chrome Extension Will Help You Hide Google's 'Spam' AI Contenthide gemini is an extension that removes the 'ask gemini' button from gmail, and uses css to hide gemini elements on other google websites.
- How to hide and unhide all desktop icons on Windowsmany programs installed on windows automatically add icons to the desktop, causing your desktop to become tangled and often have to be removed. if you prefer a clean desktop, you can hide all icons on your computer screen.
- 4 free software to hide photos and videos on Android4 android apps allow you to store photos, videos, text messages, call logs into a secret folder on your smartphone without fear of being discovered by others.
- Instructions on how to hide IP addresshiding your ip address while surfing the web in public places will help you avoid the hassle of the internet.
- PrivateMe: Free application to help hide applications and sensitive data for Androidyou don't want others to see some apps, images or data stored on your device? hide app & pictures - privateme is a great choice to help you hide them safely and very easy to use.
- Hide the Windows folder in a professional waynormally, when you want to hide certain folder on windows, we usually right-click and select properties, then select the hidden option. but doing it that way is easy and everyone can know. if you want to hide folders in a more professional way like an it connoisseur, you can follow the following instructions of tipsmake.com.
- How to hide personal information on Windows 10 login screen?when you log on to a windows 10 computer using a microsoft account, on the windows 10 login screen will display the name and email address of the latest login user. however, if you use a public computer, or when someone borrowed your computer for use, all your personal information, especially microsoft accounts, will not be secured.
- How to hide message content on Telegramtelegram has a very interesting feature that is to hide the content of sent messages through the spoiler tag option. then the content of the message you choose will be completely hidden, or partly depending on the user's setting.