<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Secure Deletion Archives - Datarecovery.com</title>
	<atom:link href="https://datarecovery.com/category/services/secure-deletion/feed/" rel="self" type="application/rss+xml" />
	<link></link>
	<description></description>
	<lastBuildDate>Mon, 17 Nov 2025 22:31:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.3</generator>
	<item>
		<title>This “Military-Grade&#8221; USB Gadget Destroys Hard Drive Data</title>
		<link>https://datarecovery.com/rd/this-military-grade-usb-gadget-destroys-hard-drive-data/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Tue, 18 Nov 2025 22:30:49 +0000</pubDate>
				<category><![CDATA[Data Recovery Knowledge]]></category>
		<category><![CDATA[Secure Deletion]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=8471</guid>

					<description><![CDATA[<p>A new USB device is attracting attention for offering a &#8220;military-grade&#8221; solution to a common problem: How to permanently erase sensitive data from a hard drive. <br />
The device appears to be the sole offering of the brand DESTRUCT, which claims...</p>
<p>The post <a href="https://datarecovery.com/rd/this-military-grade-usb-gadget-destroys-hard-drive-data/">This “Military-Grade&#8221; USB Gadget Destroys Hard Drive Data</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_6969" style="width: 310px" class="wp-caption alignleft"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-6969" class="size-medium wp-image-6969" src="https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-300x225.jpg" alt="hard drive parts inventory, drawer full of drives" width="300" height="225" srcset="https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-300x225.jpg 300w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-1024x768.jpg 1024w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-768x576.jpg 768w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-1536x1152.jpg 1536w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50.jpg 2016w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-6969" class="wp-caption-text">A drawer full of donor hard drives in Datarecovery.com&#8217;s parts inventory.</p></div>
<p><span style="font-weight: 400;">A new USB device is attracting attention for offering a &#8220;military-grade&#8221; solution to a common problem: How to permanently erase sensitive data from a hard drive. </span></p>
<p><span style="font-weight: 400;">The device appears to be the sole offering of the brand DESTRUCT, which claims it utilizes advanced algorithms and multi-pass techniques to thoroughly overwrite disk contents. </span></p>
<p><span style="font-weight: 400;">But for most users, this dedicated hardware may be unnecessary. We haven’t worked with a DESTRUCT USB gadget, but we’ve seen similar tools — and for the most part, they’re overkill. Here’s why. </span></p>
<h2><span style="font-weight: 400;">USB Data Sanitization Gadgets: Not a Scam, But Nothing Special</span></h2>
<p><span style="font-weight: 400;">The Destruct gadget plugs into a computer’s USB port and, as</span><a href="https://tech.yahoo.com/computing/articles/military-grade-usb-gadget-totally-161700928.html"> <span style="font-weight: 400;">Yahoo! Tech reports</span></a><span style="font-weight: 400;">, operates as a bootable environment to execute data sanitization software automatically. </span></p>
<p><span style="font-weight: 400;">Operating outside the computer’s primary operating system is key because it allows the device to overwrite the entire drive, including the OS, boot sectors, and hidden partitions. The goal is to ensure all data is destroyed by running comprehensive multi-pass programs.</span></p>
<p><span style="font-weight: 400;">The issue? You can download free software that performs the same function. If you’ve got a spare USB drive, for example, you might grab <a href="https://dban.org/">Darius Boot and Nuke (DBAN)</a>, a totally free utility that provides multiple options for data sanitization.</span></p>
<h3><span style="font-weight: 400;">What Is &#8220;Military-Grade&#8221; Data Sanitization?</span></h3>
<p><span style="font-weight: 400;">The term &#8220;military-grade&#8221; refers to highly specific, multi-pass overwriting standards, most famously the U.S. Department of Defense&#8217;s DoD 5220.22-M standard. We’re assuming that the Destruct gadget uses those methods, since </span><a href="https://www.amazon.com/DESTRUCT-USB-Gadget-Computer-Destruction/dp/B07RPNJPRG?sr=8-1"><span style="font-weight: 400;">buyers on Amazon have noted</span></a><span style="font-weight: 400;"> that the device can take </span><i><span style="font-weight: 400;">multiple days </span></i><span style="font-weight: 400;">to sanitize a single HDD. </span></p>
<p><span style="font-weight: 400;">These multi-pass methods were developed for older, low-density magnetic media where residual magnetic traces might theoretically be detected after a single overwrite. </span></p>
<p><span style="font-weight: 400;">“Theoretically&#8221; is an important bit of language: We’ve seen residual magnetic traces of data on extremely old media (such as floppy disks), but they weren’t nearly sufficient for data recovery purposes.</span></p>
<p><span style="font-weight: 400;">Given the high density of modern hard drives, magnetic artifacts are not a serious concern for data recovery (or data sanitization). </span></p>
<h2><span style="font-weight: 400;">To Sanitize Data, a Single-Pass Overwrite is Sufficient</span></h2>
<p><span style="font-weight: 400;">Today, for modern, high-density hard disk drives (</span><b>HDDs</b><span style="font-weight: 400;">), a </span><b>single-pass overwrite</b><span style="font-weight: 400;"> with zeros or a random pattern is generally considered sufficient. The original data is made unrecoverable by any known software or laboratory technique. </span></p>
<p><span style="font-weight: 400;">Military-grade methods are valid but extremely time-consuming. Learn more about secure data wiping for HDDs in our article,</span><a href="https://datarecovery.com/rd/how-to-securely-wipe-a-hard-drive-before-selling-or-recycling-it/"> <span style="font-weight: 400;">How to Securely Wipe a Hard Drive Before Selling or Recycling It</span></a><span style="font-weight: 400;">.</span></p>
<h3><span style="font-weight: 400;">For SSDs, A Basic Format Sanitizes the Drive</span></h3>
<p><span style="font-weight: 400;">If you are dealing with a </span><b>Solid State Drive (SSD)</b><span style="font-weight: 400;">, the process is different, and a utility like DBAN isn’t necessary — fully overwriting the memory cells of an SSD will put unnecessary wear on the device. Most data sanitization programs will refuse to execute multiple overwrites on an SSD for that reason.</span></p>
<p><span style="font-weight: 400;">For a modern SSD, a full format is fine. The drive&#8217;s internal firmware uses </span><a href="https://datarecovery.com/rd/how-trim-can-make-data-recovery-impossible/"><span style="font-weight: 400;">TRIM</span></a><span style="font-weight: 400;"> to ensure deleted blocks are quickly and completely emptied. The most reliable method is to use the drive&#8217;s built-in ATA Secure Erase command, which instantly resets all storage cells. Most SSD manufacturers provide a free utility (e.g., Samsung Magician, Crucial Storage Executive) to execute this command easily.</span></p>
<h2><span style="font-weight: 400;">Understanding the NIST SP 800-88 Guidelines</span></h2>
<p><span style="font-weight: 400;">For commercial, government, or regulated environments, security protocols must be precise and verifiable. The</span><a href="https://csrc.nist.gov/pubs/sp/800/88/r1/final"><span style="font-weight: 400;"> National Institute of Standards and Technology (NIST)</span></a><span style="font-weight: 400;"> created</span><a href="https://datarecovery.com/rd/standards-for-secure-data-sanitization/"><span style="font-weight: 400;"> Special Publication 800-88: Guidelines for Media Sanitization</span></a><span style="font-weight: 400;">, which defines three distinct security levels for data destruction:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><b>Clear:</b><span style="font-weight: 400;"> A software overwrite (like DBAN). It protects against simple, non-invasive data recovery techniques. This is effective for HDDs but is considered a minimum level of security.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Purge:</b><span style="font-weight: 400;"> Protects against state-of-the-art laboratory attacks. For HDDs, this involves degaussing (destroying the magnetic field) or a certified multiple-pass overwrite. For SSDs, it usually involves cryptographically erasing the encryption key.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Destroy:</b><span style="font-weight: 400;"> The most secure method, rendering the media permanently unusable. It involves physical destruction methods like incineration, pulverizing, or shredding.</span></li>
</ol>
<p><span style="font-weight: 400;">These defined standards ensure that organizations select the correct sanitization method to meet their specific risk profile, regulatory obligations (like HIPAA), and the type of storage media they are using.</span></p>
<h2><span style="font-weight: 400;">When Professional Data Sanitization Is Required</span></h2>
<p><span style="font-weight: 400;">For individuals, a quick USB gadget or a free utility is sufficient. However, when decommissioning assets for a business, a healthcare provider, or a government organization, security and legal compliance are the top priority.</span></p>
<p><span style="font-weight: 400;">Protecting your organization from a data breach requires an auditable, verified, and legally defensible process. This is where professional, at-scale data sanitization services become necessary. </span></p>
<p><span style="font-weight: 400;">At Datarecovery.com, we utilize specialized hardware and processes, such as magnetic degaussing and certified software solutions that meet or exceed the NIST standard. Crucially, we maintain a complete chain of custody — documentation that is essential for passing an audit or meeting regulatory requirements. </span></p>
<p><span style="font-weight: 400;">If your organization has decommissioned data storage media and requires a verified, certified, and compliant destruction process, we offer secure solutions.</span></p>
<p><span style="font-weight: 400;">Call 1-800-237-4200 to discuss your media destruction project with an expert or</span><a href="https://datarecovery.com/submit.php"> <span style="font-weight: 400;">submit a case online</span></a><span style="font-weight: 400;">.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/this-military-grade-usb-gadget-destroys-hard-drive-data/">This “Military-Grade&#8221; USB Gadget Destroys Hard Drive Data</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>HDD Disposal: Best Security Practices</title>
		<link>https://datarecovery.com/rd/hdd-disposal-best-security-practices/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Wed, 28 Aug 2024 16:57:35 +0000</pubDate>
				<category><![CDATA[Data Recovery Knowledge]]></category>
		<category><![CDATA[Secure Deletion]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=8037</guid>

					<description><![CDATA[<p>You’re getting a new computer, or just replacing your hard disk drive (HDD) with a solid-state drive. What do you do with your old storage media? <br />
This is one of the most common questions we receive — and it’s an...</p>
<p>The post <a href="https://datarecovery.com/rd/hdd-disposal-best-security-practices/">HDD Disposal: Best Security Practices</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div id="attachment_4095" style="width: 310px" class="wp-caption alignleft"><img decoding="async" aria-describedby="caption-attachment-4095" class="size-medium wp-image-4095" src="https://datarecovery.com/wp-content/uploads/2015/07/Zl1fTNK-300x232.jpg" alt="Fire-Damaged Hard Drive" width="300" height="232" srcset="https://datarecovery.com/wp-content/uploads/2015/07/Zl1fTNK-300x232.jpg 300w, https://datarecovery.com/wp-content/uploads/2015/07/Zl1fTNK-1024x793.jpg 1024w, https://datarecovery.com/wp-content/uploads/2015/07/Zl1fTNK-768x595.jpg 768w, https://datarecovery.com/wp-content/uploads/2015/07/Zl1fTNK.jpg 1279w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-4095" class="wp-caption-text">A hard drive badly burnt in a house fire.</p></div>
<p><span style="font-weight: 400;">You’re getting a new computer, or just replacing your hard disk drive (HDD) with a solid-state drive. What do you do with your old storage media? </span></p>
<p><span style="font-weight: 400;">This is one of the most common questions we receive — and it’s an excellent question to address to a data recovery provider. After all, we’re able to recover files from hard drives that have been in house fires and floods; we </span><i><span style="font-weight: 400;">know </span></i><span style="font-weight: 400;">what it takes to permanently destroy data. </span></p>
<p><span style="font-weight: 400;">The quick answer: You can use media sanitization software to securely erase your HDD, provided that it’s currently in a working condition. Some popular tools include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://dban.org/"><span style="font-weight: 400;">Darik’s Boot and Nuke (DBAN)</span></a><span style="font-weight: 400;"> </span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://macrorit.com/free-data-wiper.html"><span style="font-weight: 400;">Macrorit Data Wiper</span></a><span style="font-weight: 400;"> </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Microsoft </span><a href="https://learn.microsoft.com/en-us/sysinternals/downloads/sdelete"><span style="font-weight: 400;">SDelete</span></a><span style="font-weight: 400;"> </span></li>
</ul>
<p><span style="font-weight: 400;">If your hard drive isn’t working, it must be degaussed, shredded, or incinerated. Consult your local electronic recycling center (after all, you </span><i><span style="font-weight: 400;">really </span></i><span style="font-weight: 400;">shouldn’t be tossing a hard drive in the trash; </span><a href="https://www.epa.gov/smm-electronics"><span style="font-weight: 400;">all drives have plenty of recyclable components</span></a><span style="font-weight: 400;">). </span></p>
<p><span style="font-weight: 400;">If you have a large quantity of hard drives that need to be sanitized, the best practice is to work with a media sanitization provider. Datarecovery.com provides these services, and we can include verification and chain-of-custody reports upon request to aid in compliance. To learn more, call 1-800-237-4200 or </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">request a quote online</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">Below, we’ll address some common questions regarding HDD disposal techniques. </span></p>
<h2><span style="font-weight: 400;">Can I physically destroy my hard drive to get rid of data?</span></h2>
<div id="attachment_6923" style="width: 310px" class="wp-caption alignright"><img decoding="async" aria-describedby="caption-attachment-6923" class="size-medium wp-image-6923" src="https://datarecovery.com/wp-content/uploads/2022/01/head-crash-crop2-300x196.jpg" alt="the inside of a hard drive" width="300" height="196" srcset="https://datarecovery.com/wp-content/uploads/2022/01/head-crash-crop2-300x196.jpg 300w, https://datarecovery.com/wp-content/uploads/2022/01/head-crash-crop2.jpg 626w" sizes="(max-width: 300px) 100vw, 300px" /><p id="caption-attachment-6923" class="wp-caption-text">The platters and actuator heads of a hard drive.</p></div>
<p><span style="font-weight: 400;">Yes, but to render data unrecoverable, you’ll need to target the </span><i><span style="font-weight: 400;">platters. </span></i><span style="font-weight: 400;">Those are the magnetic discs that contain your actual data; breaking other components might make the drive unusable, but if the platters are still intact, data recovery is still technically possible. </span></p>
<p><span style="font-weight: 400;">You could physically destroy a hard drive on your own by drilling holes through it or removing the platters and breaking them apart. That’s a labor intensive process, so it’s really not recommended — but if you have the time and tools (and you want to see what the inside of your HDD looks like), it’s certainly doable. </span></p>
<p><span style="font-weight: 400;">After destroying your platters, make sure to dispose of the leftovers in an environmentally friendly way. </span></p>
<h2><span style="font-weight: 400;">What does NIST recommend for HDD disposal?</span></h2>
<p><span style="font-weight: 400;">The National Institute of Standards and Technology (NIST) provides comprehensive guidelines for media sanitization, including hard drive disposal. </span><a href="https://csrc.nist.gov/pubs/sp/800/88/r1/final"><span style="font-weight: 400;">NIST Special Publication 800-88 Rev. 1</span></a><span style="font-weight: 400;"> outlines three primary methods for sanitizing data storage devices:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Clear:</b><span style="font-weight: 400;"> This involves overwriting the data on the hard drive with a pattern of ones and zeros. This is simple and cost-effective, but it’s not appropriate for sensitive data. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Purge:</b><span style="font-weight: 400;"> This method uses specialized software or hardware tools to overwrite the data on the hard drive multiple times with complex patterns (see the secure sanitization programs we mentioned in the introduction to this article). Purging is generally considered a more secure option than clearing, but it can be time-consuming.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Destroy:</b><span style="font-weight: 400;"> This involves physically destroying the hard drive to render the data unrecoverable. As mentioned earlier, this method can be effective but comes with its own set of challenges, including environmental concerns and the potential for hazardous material exposure.</span></li>
</ul>
<p><span style="font-weight: 400;">To learn more about NIST standards, read: </span><a href="https://datarecovery.com/rd/standards-for-secure-data-sanitization/"><span style="font-weight: 400;">What Are the Standards for Secure Data Sanitization?</span></a></p>
<h2><span style="font-weight: 400;">Can I just encrypt my hard drive instead of disposing of it?</span></h2>
<p><span style="font-weight: 400;">Encrypting your hard drive can be an effective way to protect your data, but it&#8217;s not a foolproof solution. If the encryption key is compromised or the encryption software has zero-day vulnerabilities, your data could still be at risk. </span></p>
<p><span style="font-weight: 400;">Moreover, encryption doesn&#8217;t address the physical security of the hard drive itself. If the hard drive is lost or stolen, the data could still be accessed if the encryption is bypassed.</span></p>
<h2><span style="font-weight: 400;">For at-scale media sanitization, trust the experts at Datarecovery.com</span></h2>
<p><span style="font-weight: 400;">HDD disposal requires careful consideration to ensure the secure and responsible handling of sensitive data. You can handle this on your own — but at scale, sanitization should be handled by a qualified data services provider.</span></p>
<p><span style="font-weight: 400;">Our specialists meticulously maintain chain of custody records and adhere to NIST SP 800-88 standards, ensuring your project stays on track and compliant. This comprehensive approach not only streamlines your media migration or sanitization process, but also significantly reduces costs.</span></p>
<p><span style="font-weight: 400;">To learn more, </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">submit a case online</span></a><span style="font-weight: 400;"> or call 1-800-237-4200 to speak with an expert.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/hdd-disposal-best-security-practices/">HDD Disposal: Best Security Practices</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Before Recycling a Hard Drive, Read This</title>
		<link>https://datarecovery.com/rd/before-recycling-a-hard-drive-read-this/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Wed, 08 May 2024 20:10:25 +0000</pubDate>
				<category><![CDATA[Secure Deletion]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=7950</guid>

					<description><![CDATA[<p>You should never toss a hard drive into a dumpster — hard drives are recyclable, and given that we create more than <a href="https://www.nrdc.org/stories/59-million-tons-our-e-waste-problem-getting-out-control">59 million tons of electronic waste</a> every year, every bit of recycling counts (pardon the pun). <br />
But while...</p>
<p>The post <a href="https://datarecovery.com/rd/before-recycling-a-hard-drive-read-this/">Before Recycling a Hard Drive, Read This</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">You should never toss a hard drive into a dumpster — hard drives are recyclable, and given that we create more than </span><a href="https://www.nrdc.org/stories/59-million-tons-our-e-waste-problem-getting-out-control"><span style="font-weight: 400;">59 million tons of electronic waste</span></a><span style="font-weight: 400;"> every year, every bit of recycling counts (pardon the pun). </span></p>
<p><span style="font-weight: 400;">But while recycling your e-waste is an excellent idea from an environmental perspective, privacy and security are also important. Once you’ve lost custody of your device, anything could happen. You want to destroy all recoverable data on the device </span><i><span style="font-weight: 400;">before </span></i><span style="font-weight: 400;">it leaves your control. </span></p>
<p><span style="font-weight: 400;">As a leading data recovery provider, we’ve got tips for preventing anyone — including trained forensics engineers — from accessing your data. Here’s everything you need to do before you recycle an old hard drive (and tips for handling the process at scale). </span></p>
<h2><span style="font-weight: 400;">Protect your data by performing a complete overwrite of your HDD. </span></h2>
<p><span style="font-weight: 400;">The best practices of data sanitization are outlined in the </span><a href="https://csrc.nist.gov/pubs/sp/800/88/r1/final"><span style="font-weight: 400;">National Institute of Standards and Technology (NIST)’s SP 800-88.</span></a><span style="font-weight: 400;"> If you’re not in the IT industry, however, you don’t need to read through that document — just understand that there are two basic ways to secure your data: By </span><b>purging </b><span style="font-weight: 400;">it with logical methods or </span><b>destroying </b><span style="font-weight: 400;">it with physical methods. </span></p>
<p><span style="font-weight: 400;">Of these options, purging is easier, while destroying is less time-consuming. If you’re clearing a single hard drive and it’s still functional, purging is your best bet. </span></p>
<p><span style="font-weight: 400;">To purge data in a way that makes it entirely unrecoverable, you must overwrite all data at least once with a fixed data value. We do not recommend specific software products, but free utilities like </span><a href="https://dban.org/"><span style="font-weight: 400;">Darik’s Boot and Nuke (DBAN)</span></a><span style="font-weight: 400;"> and </span><a href="https://macrorit.com/free-data-wiper.html"><span style="font-weight: 400;">Macrorit Data Wiper</span></a><span style="font-weight: 400;"> are popular options. </span></p>
<p><span style="font-weight: 400;">These programs overwrite data on a low level. Why is that important? The short answer is that when you delete a file from a hard drive, it’s not necessarily </span><i><span style="font-weight: 400;">gone; </span></i><span style="font-weight: 400;">the operating system simply marks the space occupied by the file as “available.” Over time, the file will be overwritten, but it’s still recoverable in the meantime. </span></p>
<p><span style="font-weight: 400;">Fully overwriting the file will completely prevent any chance of recovery. Obviously, you’ll want to back up any important files before using secure deletion software (particularly Boot and Nuke, which is extremely simple and effective). </span></p>
<p><span style="font-weight: 400;">Related: </span><a href="https://datarecovery.com/rd/when-data-is-gone-forever/"><span style="font-weight: 400;">When Data Is “Gone Forever:” 3 Impossible Data Recovery Scenarios</span></a></p>
<h2><span style="font-weight: 400;">Physical data sanitization methods can also prevent unauthorized data recovery. </span></h2>
<div id="attachment_6927" style="width: 310px" class="wp-caption alignright"><img loading="lazy" decoding="async" aria-describedby="caption-attachment-6927" class="size-medium wp-image-6927" src="https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2-300x242.jpg" alt="The exposed platters of a hard drive" width="300" height="242" srcset="https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2-300x242.jpg 300w, https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2-768x618.jpg 768w, https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2.jpg 827w" sizes="auto, (max-width: 300px) 100vw, 300px" /><p id="caption-attachment-6927" class="wp-caption-text">The exposed platters of a hard drive.</p></div>
<p><span style="font-weight: 400;">If your hard drive is not operational — or if you’re a bit paranoid about your data security — you can physically destroy the device. </span></p>
<p><span style="font-weight: 400;">To do this, you’d simply open up the hard drive, remove the platters (the discs that store your data), and treat them like murder weapons: Scratch them, smash them, or shatter them into a hundred pieces. </span></p>
<p><span style="font-weight: 400;">Of course, this is easier said than done. Some general concepts to keep in mind:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">While the printed circuit board (PCB) is an important component, destroying the hard drive’s electronics will not necessarily make data unrecoverable. You must target the platters. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Most hard drive enclosures are secured with Torx screws, so you’ll need a Torx screwdriver set to get to the platters. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Many hard drives have multiple platters. Each side of every platter must be physically destroyed to prevent any chance of recovery. </span></li>
</ul>
<p><span style="font-weight: 400;">Physically destroying a hard drive isn’t especially difficult — in fact, if you’re interested in electronics, it’s quite fun! — but it’s extremely time consuming. At scale, you’ll need commercial degaussers (which demagnetize platters) and/or shredders.</span></p>
<h2><span style="font-weight: 400;">For large-scale hard drive recycling projects, plan carefully.</span></h2>
<p><span style="font-weight: 400;">If you’re recycling 100 or more hard drives, your best bet is to work with an experienced data partner that can perform software/physical data sanitization. Look for a partner that can provide a chain of custody report and other relevant documentation of the process. This is especially important for organizations that need to maintain compliance with PCI-DSS and similar privacy/security laws. </span></p>
<p><span style="font-weight: 400;">Datarecovery.com provides cost-effective data sanitization services designed to aid in compliance and reduce IT department workloads. To learn more, </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">submit a case online</span></a><span style="font-weight: 400;"> or call </span><b>1-800-237-4200</b><span style="font-weight: 400;"> to speak with an expert.</span></p>
<p>The post <a href="https://datarecovery.com/rd/before-recycling-a-hard-drive-read-this/">Before Recycling a Hard Drive, Read This</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Are the Standards for Secure Data Sanitization?</title>
		<link>https://datarecovery.com/rd/standards-for-secure-data-sanitization/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Wed, 13 Sep 2023 20:40:40 +0000</pubDate>
				<category><![CDATA[Secure Deletion]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=7693</guid>

					<description><![CDATA[<p>Several standards exist for secure data/media sanitization, but the most commonly cited standards are NIST SP 800-88. <br />
Published by the National Institute of Standards and Technology (NIST), SP 800-88 defines processes for destroying data on hard disk drives (HDDs) and...</p>
<p>The post <a href="https://datarecovery.com/rd/standards-for-secure-data-sanitization/">What Are the Standards for Secure Data Sanitization?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Several standards exist for secure data/media sanitization, but the most commonly cited standards are NIST SP 800-88. </span></p>
<p><span style="font-weight: 400;">Published by the National Institute of Standards and Technology (NIST), SP 800-88 defines processes for destroying data on hard disk drives (HDDs) and other forms of electronic media. The standard was published in 2006, then updated in December 2014 to reflect changes in media storage technologies. </span></p>
<h2><span style="font-weight: 400;">What Does NIST SP 800-88 recommend for media sanitization?</span></h2>
<p><span style="font-weight: 400;">NIST SP 800-88 defines three ways to sanitize media (and data): </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Clear the data by using software (or hardware) to overwrite data with simple read and write commands.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Purge the data by using software to execute specific sanitization methods.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Destroy the media through degaussing or by physically destroying the storage areas of the device/disk.</span></li>
</ul>
<p><span style="font-weight: 400;">Below, we’ll provide an overview of each method and its NIST SP 800-88 Rev. 1 requirements. </span><a href="https://csrc.nist.gov/pubs/sp/800/88/r1/final"><span style="font-weight: 400;">The full NIST standards can be found on the institute’s website.</span></a></p>
<h3><span style="font-weight: 400;">Clearing Data to Meet NIST SP 800-88</span></h3>
<p><span style="font-weight: 400;">Clearing data is the least secure method outlined in NIST SP 800-88, and is only intended to protect data from basic recovery techniques. For example, resetting a device to its factory state would qualify as “clearing&#8221; data under NIST SP 800-88.</span></p>
<p><span style="font-weight: 400;">Simple read-and-write commands should only be used when data security is not a crucial concern (or, in the NIST’s language, “if information disclosure would have no impact on organizational mission, would not result in damage to organizational assets, and would not result in financial loss or harm to any individuals&#8221;). </span></p>
<p><span style="font-weight: 400;">This is because Clear sanitization methods can usually be bypassed through standard data recovery efforts. For example, recovering data from a formatted hard drive can be accomplished relatively easily — Clear techniques should only be used when the device will remain under organizational control. </span></p>
<h3><span style="font-weight: 400;">Purging Data to Meet NIST SP 800-88</span></h3>
<p><span style="font-weight: 400;">Purge techniques typically fall into several categories:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Overwriting the target data/device.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Utilizing block erase methods.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Utilizing cryptographic erase methods.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Destroying the device (see below), which also renders the data “purged.”</span></li>
</ul>
<p><span style="font-weight: 400;">For overwrites on magnetic media and flash memory devices, NIST SP 800-88 requires at least a single write pass with a fixed data value (for example, all zeros). Multiple write passes are recommended when information disclosure would be a medium or high concern.</span></p>
<p><span style="font-weight: 400;">For flash media, data may be purged through a block erase. NIST SP 800-88 recommends writing binary 1s across the user addressable area of the storage media, then performing a second block erase.</span></p>
<p><span style="font-weight: 400;">Cryptographic erasure methods are more secure, and should be combined with block erasure or traditional overwrites for optimal security.</span></p>
<h3><span style="font-weight: 400;">Destroying Media to Meet NIST SP 800-88</span></h3>
<p><span style="font-weight: 400;">Destroy methods, by nature, also “purge&#8221; the target data. However, destroying media renders it unusable — as such, Destroy methods are typically used when the media is leaving the organization.</span></p>
<p><span style="font-weight: 400;">Destroy methods vary by media type:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Hard drives that do not have a flash storage component may be </span><i><span style="font-weight: 400;">degaussed. </span></i><span style="font-weight: 400;">Degaussing requires specialized equipment, and the media must be inspected after degaussing to ensure that data is completely destroyed. Improper positioning may prevent degaussing from destroying all user-addressable data; the platters may also be removed and purged with a degaussing wand.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Degaussing is not recommended for SCSI hard drives. Because flash media does not store data magnetically, degaussing is ineffective for flash media.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Hard drives, flash media, and optical media may be shredded, pulverized, or incinerated. As we’ve discussed in other blogs, <a href="https://datarecovery.com/2015/07/what-does-a-fire-damaged-hard-drive-look-like/">incineration is not ideal for hard drive destruction</a> — the process must be carried out at extremely high temperatures to destroy all data, and incineration is not environmentally friendly.</span></li>
</ul>
<h2><span style="font-weight: 400;">NIST SP 800-88 Compliance: Choosing a Data Sanitization Method</span></h2>
<p><span style="font-weight: 400;"><img loading="lazy" decoding="async" class="size-medium wp-image-6969 alignright" src="https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-300x225.jpg" alt="hard drive parts inventory, drawer full of drives" width="300" height="225" srcset="https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-300x225.jpg 300w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-1024x768.jpg 1024w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-768x576.jpg 768w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50-1536x1152.jpg 1536w, https://datarecovery.com/wp-content/uploads/2022/02/IMG_3699_scale50.jpg 2016w" sizes="auto, (max-width: 300px) 100vw, 300px" />NIST SP 800-88 is a straightforward document with specific standards for different types of data storage media. However, at scale, organizations often encounter challenges when complying with the guidelines.</span></p>
<p><span style="font-weight: 400;">For example, degaussing hard drives — while reliable — requires knowledge and time. The destruction must be verified to ensure compliance, and to comply with other laws, workers may need to keep detailed documentation of the process.</span></p>
<p><span style="font-weight: 400;">Datarecovery.com recommends working with an experienced partner when carrying out at-scale media sanitization. Our experts can maintain chain of custody reports while following NIST SP 800-88 requirements, reducing the cost of a media migration or sanitization project — and ensuring worry-free compliance with relevant standards and security/privacy laws. </span></p>
<p><span style="font-weight: 400;">To learn more, </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">submit a case online</span></a><span style="font-weight: 400;"> or call 1-800-237-4200 to speak with an expert.</span></p>
<p>The post <a href="https://datarecovery.com/rd/standards-for-secure-data-sanitization/">What Are the Standards for Secure Data Sanitization?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What Is Hard Drive Degaussing?</title>
		<link>https://datarecovery.com/rd/what-is-hard-drive-degaussing/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Tue, 28 Feb 2023 18:35:53 +0000</pubDate>
				<category><![CDATA[Secure Deletion]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=7466</guid>

					<description><![CDATA[<p>Degaussing is a data sanitization procedure that destroys data by applying powerful magnetic fields. Here’s how the process works.</p>
<p>The post <a href="https://datarecovery.com/rd/what-is-hard-drive-degaussing/">What Is Hard Drive Degaussing?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><i><span style="font-weight: 400;">Degaussing </span></i><span style="font-weight: 400;">is a data sanitization procedure that destroys data by applying powerful magnetic fields. </span></p>
<p><span style="font-weight: 400;">Obviously, this only works on magnetic media — namely, hard disk drives (HDDs) and data storage tapes. When performed properly, degaussing irretrievably destroys data. Even with professional data recovery equipment, the information is lost forever. </span></p>
<p><span style="font-weight: 400;">If you need to sanitize a large number of hard drives or data tapes, degaussing is an effective option. However, like all data sanitization methods, there are risks and drawbacks. </span></p>
<h2><span style="font-weight: 400;">How Hard Drive Degaussing Works</span></h2>
<p><span style="font-weight: 400;">Hard drives contain </span><i><span style="font-weight: 400;">platters </span></i><span style="font-weight: 400;">coated with a thin magnetic material. When the drive operates, </span><i><span style="font-weight: 400;">actuator heads </span></i><span style="font-weight: 400;">read the charges from the platters and output data to the computer. </span></p>
<p><img loading="lazy" decoding="async" class="size-medium wp-image-6927 alignright" src="https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2-300x242.jpg" alt="hard drive disk head crash on platters" width="300" height="242" srcset="https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2-300x242.jpg 300w, https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2-768x618.jpg 768w, https://datarecovery.com/wp-content/uploads/2022/01/Photo-Dec-05-3-53-00-PM-1_crop2.jpg 827w" sizes="auto, (max-width: 300px) 100vw, 300px" /></p>
<p><span style="font-weight: 400;">The magnetic charges on the platters can be positive or neutral. Essentially, the hard drive sets the magnets in one way or the other (the data is stored in a </span><i><span style="font-weight: 400;">binary </span></i><span style="font-weight: 400;">format).</span></p>
<p><span style="font-weight: 400;">Hard drives also use error correction codes (EOC) to prevent missing charges from causing data loss, and a single file may be stored in disparate locations — not just in one space on the platter. To sanitize data, you’ll need to eliminate all traces of the original magnetic charges.</span></p>
<p><span style="font-weight: 400;">Degaussers apply a powerful charge across the surface of </span><i><span style="font-weight: 400;">all </span></i><span style="font-weight: 400;">hard drive platters, destroying all data (including the data that the hard drive references during startup). </span></p>
<p><span style="font-weight: 400;">Some degaussers apply different types of charges to ensure that data is fully sanitized, and some data sanitization protocols call for several passes through degaussing equipment. In reality, once a hard drive passes through a degausser once, there’s a near-100% chance that it’s completely unrecoverable.</span></p>
<h2><span style="font-weight: 400;">Advantages and Disadvantages of Degaussing for Data Sanitization</span></h2>
<p><span style="font-weight: 400;">Degaussing isn’t appropriate for every data sanitization project. If you need to destroy a single hard drive, running it through a degausser is overkill — but if you’re working with a large library of media or you need to meet certain privacy/security standards, it’s a viable option.</span></p>
<p><span style="font-weight: 400;">Below, we’ll discuss the advantages and disadvantages. To discuss a specific data sanitization project, </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">submit a case online</span></a><span style="font-weight: 400;"> or call 1-800-237-4200 to speak with an expert.</span></p>
<h3><span style="font-weight: 400;">Advantages of Hard Drive Degaussing</span></h3>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The degaussing process only takes a few seconds, so it’s ideal for mass HDD sanitization. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Degaussing works on broken hard drives. Any magnetic storage device can be degaussed, regardless of whether it’s functional. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Degaussing is permanent. Even with advanced data recovery equipment, the data is 100% irretrievable. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">After degaussing, media can be recycled to comply with environmental regulations.</span></li>
</ul>
<h3><span style="font-weight: 400;">Disadvantages of Hard Drive Degaussing</span></h3>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Degaussers are expensive. A basic degausser costs about $3,600, while advanced models can cost $18,000 or more. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Inexpensive models are available, but they’re not reliable for mass media sanitization. The magnetic fields of the degaussing equipment must be several times stronger than the magnetic material on the hard drive’s platters.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Operator error can prevent total data sanitization. This is especially true if the hard drive must be positioned on the degausser in a specific way.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Many data sanitization standards still require hard drive destruction after degaussing. The National Security Agency (NSA), for example, recommends media destruction. </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Degaussing a hard drive renders it permanently unusable. </span></li>
</ul>
<h2><span style="font-weight: 400;">Professional Options for Secure Data Sanitization</span></h2>
<p><span style="font-weight: 400;">As the world leader in data recovery services, Datarecovery.com provides solutions for enterprise-level data sanitization. Our experts can maintain full chain-of-custody reports and produce other relevant documentation verifying compliance with relevant data security laws. </span></p>
<p><span style="font-weight: 400;">We work closely with our clients to develop an appropriate, cost-effective media sanitization strategy. All storage devices are thoroughly tested to ensure conformance with NIST/NSA sanitization guidelines, and sanitized media can be safely destroyed onsite. </span></p>
<p><span style="font-weight: 400;">To learn more about our media sanitization services, </span><a href="http://datarecovery.com/submit.php"><span style="font-weight: 400;">request a quote online</span></a><span style="font-weight: 400;"> or call us at 1-800-237-4200.</span></p>
<p>&nbsp;</p>
<p>The post <a href="https://datarecovery.com/rd/what-is-hard-drive-degaussing/">What Is Hard Drive Degaussing?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Do Magnets Damage Solid-State Drives?</title>
		<link>https://datarecovery.com/rd/do-magnets-damage-solid-state-drives/</link>
		
		<dc:creator><![CDATA[John Krane]]></dc:creator>
		<pubDate>Mon, 27 Feb 2023 21:16:59 +0000</pubDate>
				<category><![CDATA[Secure Deletion]]></category>
		<category><![CDATA[SSD]]></category>
		<guid isPermaLink="false">https://datarecovery.com/?post_type=rd&#038;p=7463</guid>

					<description><![CDATA[<p>No, magnets will not damage solid-state drives. However, changes in magnetic fields might cause data loss under certain circumstances. </p>
<p>Strong magnetic fields can destroy data on hard disk drives (HDDs) and data tapes, for a simple reason: Those devices use...</p>
<p>The post <a href="https://datarecovery.com/rd/do-magnets-damage-solid-state-drives/">Do Magnets Damage Solid-State Drives?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">No, magnets will not damage solid-state drives. However, changes in magnetic fields might cause data loss under certain circumstances. </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-4144 alignright" src="https://datarecovery.com/wp-content/uploads/2014/07/Intel-SSD-525-Series-mSATA-220x135.jpg" alt="Intel 525 Series mSATA solid state drive" width="220" height="135" /></p>
<p><span style="font-weight: 400;">Strong magnetic fields can destroy data on hard disk drives (HDDs) and data tapes, for a simple reason: Those devices use magnetism to </span><i><span style="font-weight: 400;">store </span></i><span style="font-weight: 400;">data. Disrupting those charges will, necessarily, cause data loss. </span></p>
<p><span style="font-weight: 400;">Many professional data recovery laboratories </span><a href="https://datarecovery.com/rd/throwing-out-hard-drive-protect-data/"><span style="font-weight: 400;">purposely use magnets</span></a><span style="font-weight: 400;"> to securely erase data. </span><i><span style="font-weight: 400;">Degaussing </span></i><span style="font-weight: 400;">is a process that applies strong magnetic fields to magnetized media, rendering them blank (and completely unusable, since the magnets also destroy the data that hard drives use for startup).</span></p>
<p><span style="font-weight: 400;">This isn’t effective for solid-state drives (SSDs), flash drives, and other flash-based media. SSDs and other NAND flash devices use floating-gate transistors to store data — not magnetic charges. </span></p>
<p><span style="font-weight: 400;">Since they store data without relying on magnetic charges, you could theoretically place a strong magnet right next to your SSD without losing data (but as we’ll explain in a moment, </span><i><span style="font-weight: 400;">you should not try this</span></i><span style="font-weight: 400;">). </span></p>
<p><span style="font-weight: 400;">The bottom line: Degaussing is not an acceptable form of secure media destruction for NAND media. However, before you place your favorite rare earth magnet next to your computer, read on.</span></p>
<h2><span style="font-weight: 400;">Changes in magnetic fields can affect any electronic device.</span></h2>
<p><span style="font-weight: 400;">A strong magnetic field can destroy a hard drive’s data, but doesn’t pose a realistic danger for an SSD.</span></p>
<p><span style="font-weight: 400;">However, the </span><i><span style="font-weight: 400;">rate </span></i><span style="font-weight: 400;">at which a magnetic field changes can introduce some issues. This rate of change is called the </span><i><span style="font-weight: 400;">magnetic flux: </span></i><span style="font-weight: 400;">the number of magnetic field lines that pass through a closed surface. </span></p>
<p><span style="font-weight: 400;">Introducing a strong magnet can create small voltages, which may travel over electronic circuits and cause damage. To damage an SSD, you would need a tremendous change in magnetic flux — and that’s one of the many, many reasons that you shouldn’t bring your SSD into an MRI machine. </span></p>
<p><span style="font-weight: 400;">Realistically, you could probably place strong magnets near your SSD without causing any issues. But even with professional degaussing equipment, you should not rely on magnetism alone to securely destroy files on an SSD. </span></p>
<p><span style="font-weight: 400;">Related: </span><a href="https://datarecovery.com/2020/10/the-dangers-of-diy-data-destruction/"><span style="font-weight: 400;">The Dangers Of DIY Data Destruction</span></a></p>
<h2><span style="font-weight: 400;">How can I securely destroy my SSD?</span></h2>
<p><span style="font-weight: 400;">The simplest way to destroy an SSD is to physically shred it. Commercial shredders can certainly handle electronic media — but they’re expensive, and shredding your drive can create environmental hazards. </span></p>
<p><span style="font-weight: 400;">You can also disassemble your SSD and pry out the memory chips that store the data, then destroy them. This is a time-consuming process, but it’s certainly secure.</span></p>
<p><span style="font-weight: 400;">For home and office computer users, there’s an easier way to handle data sanitization: Format the SSD. After the drive completes a </span><a href="http://a"><span style="font-weight: 400;">TRIM operation</span></a><span style="font-weight: 400;">, data is irreversibly destroyed. You can also encrypt the SSD, which may be a more realistic option if you’d eventually like to restore the data.</span></p>
<p><span style="font-weight: 400;">Related: </span><a href="https://datarecovery.com/rd/solid-state-drive-ssd-data-recovery-are-my-files-lost-forever/"><span style="font-weight: 400;">Solid-State Drive (SSD) Data Recovery: Are My Files Lost Forever?</span></a></p>
<h2><span style="font-weight: 400;">Before intentionally destroying data, make sure you’re prepared for the consequences.</span></h2>
<p><span style="font-weight: 400;">If your SSD isn’t functioning as expected and you simply want to sanitize the data before recycling it, formatting (or removing the NAND memory chips) is an appropriate option. </span></p>
<p><span style="font-weight: 400;">However, if your organization must follow certain standards for data sanitization, we strongly recommend working with experts. A simple format isn’t sufficient for meeting the </span><a href="https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-88r1.pdf"><span style="font-weight: 400;">NIST’s Guidelines for Media Sanitization</span></a><span style="font-weight: 400;">, and physically destroying the device — while sufficient for sanitization — may cause compliance issues if you fail to keep appropriate documentation.</span></p>
<p><span style="font-weight: 400;">Datarecovery.com provides extensive services for data sanitization, storage media disposal, and data recovery. To learn more, <a href="http://datarecovery.com/submit.php">submit a case online</a> or call us at 1-800-237-4200 to speak with an expert.</span></p>
<p>The post <a href="https://datarecovery.com/rd/do-magnets-damage-solid-state-drives/">Do Magnets Damage Solid-State Drives?</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Windows Format Command Line Behavior Changed</title>
		<link>https://datarecovery.com/rd/how-windows-format-command-line-behavior-changed/</link>
		
		<dc:creator><![CDATA[Mike Katich]]></dc:creator>
		<pubDate>Thu, 12 Nov 2015 15:03:02 +0000</pubDate>
				<category><![CDATA[Data Recovery Knowledge]]></category>
		<category><![CDATA[Secure Deletion]]></category>
		<guid isPermaLink="false">http://datarecovery.com/?post_type=rd&#038;p=4416</guid>

					<description><![CDATA[<p><a href="https://datarecovery.com/wp-content/uploads/2015/11/Format-GUI-2a.png"></a>I recently was asked to contribute to a discussion on the IT social community of Spiceworks. It started out as a question about disk formatting utilities, but by the end of the discussion, users were trying to determine what the...</p>
<p>The post <a href="https://datarecovery.com/rd/how-windows-format-command-line-behavior-changed/">How Windows Format Command Line Behavior Changed</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><a href="https://datarecovery.com/wp-content/uploads/2015/11/Format-GUI-2a.png"><img loading="lazy" decoding="async" class="alignright size-full wp-image-4417" src="https://datarecovery.com/wp-content/uploads/2015/11/Format-GUI-2a.png" alt="Format GUI in Windows" width="287" height="484" srcset="https://datarecovery.com/wp-content/uploads/2015/11/Format-GUI-2a.png 287w, https://datarecovery.com/wp-content/uploads/2015/11/Format-GUI-2a-178x300.png 178w" sizes="auto, (max-width: 287px) 100vw, 287px" /></a>I recently was asked to contribute to a discussion on the IT social community of Spiceworks. It started out as a question about disk formatting utilities, but by the end of the discussion, users were trying to determine what the &#8220;format&#8221; command for Windows&#8217; command line actually did — with no parameters as far as overwriting sectors or not.</p>
<p>I can see the reason for the discussion as this is a little tricky. I find that Microsoft hasn&#8217;t been totally clear in a few places.</p>
<p>In Windows, a &#8220;Quick Format&#8221; (which can be thought of as a &#8220;regular&#8221; format, since it’s fairly common) does not wipe/zero/overwrite the data. But what about the specific command line &#8220;format&#8221;?</p>
<p>From the <a href="https://technet.microsoft.com/en-ca/library/cc730730.aspx">MS documentation here</a>, the /q parameter appears at first glance to only prevent a CHKDSK run that would check for bad sectors.</p>
<p>But what does a &#8220;format&#8221; in the command line by itself with no parameters do? Well, this has changed in the past.</p>
<p><a href="https://datarecovery.com/wp-content/uploads/2015/11/Format-cmd-isolated.png"><img loading="lazy" decoding="async" class="size-full wp-image-4418 aligncenter" src="https://datarecovery.com/wp-content/uploads/2015/11/Format-cmd-isolated.png" alt="Format command in command prompt ready to be executed" width="161" height="35" /></a></p>
<p>From the MS documentation on the format command:</p>
<blockquote><p><em>If you do not specify any of the following command-line options, format uses the volume type to determine the default format for the disk.</em></p></blockquote>
<p>Well what does that mean? Microsoft doesn’t link to any related documentation, unfortunately.</p>
<p>The GUI format dialog has a Quick Format checkbox, which seems to correspond to the /q parameter and is normally checked by default. However, MS changed the behavior of the format command for Windows Vista and later.</p>
<blockquote><p><em>The behavior of the format command changed in Windows Vista and later Windows versions. By default in Windows Vista and later versions, the format command writes zeros to the whole disk when a full format is performed. In Windows XP and earlier versions of Windows, the format command does not write zeros to the whole disk when a full format is performed.</em></p></blockquote>
<p><a href="https://support.microsoft.com/en-us/kb/941961">https://support.microsoft.com/en-us/kb/941961</a></p>
<p>That is fairly imprecise, since we don’t know what &#8220;when a full format is performed&#8221; means for actual command line commands.</p>
<p>Essentially, it means a &#8220;non /q&#8221; format on the command line. <strong>For XP and earlier, format command without /q did not overwrite with zeroes. For Vista and later, format without /q does overwrite with zeroes</strong> (one pass unless /p is specified).</p>
<h2>How Can I Verify A Wiped Hard Drive in Windows?</h2>
<p>The previous file system is destroyed or invalidated with a format command (speaking generally and not knowing which specific command was used). However, that doesn&#8217;t mean file data is completely gone.</p>
<p>If a format was completed that did not zero out all of the sectors, previous file data remains in the areas on the drive that the new file system considers to be free space until overwritten. Software that scans through raw data should be able to find files there.</p>
<p>Also, some software can use the remnants of the previous file system if there is still enough of that around to locate and extract files with also file system metadata intact. That works more often than you&#8217;d think with the right software in the hands of the right tech.</p>
<p>To verify the drive is wiped, you can use a couple different methods. Think like a data recovery engineer; try to find evidence or data from before the wipe.</p>
<p>Running software that scans raw data for files would be a good test of a true wipe. Something easy to try is Photorec, which is free and effective. It does a good job of scanning for files in raw data, particularly JPEGs because they have very well-defined header/footer in raw data. Each different file type is a bit different to recover from raw data. Plain text files, for instance, have no identifiers at all so are basically impossible to recover in an automated fashion, though they can certainly be seen in the raw data.</p>
<p>You could also simply open the drive up in a hex editor and scroll around and see what is actually on there. Is it zeroes? That&#8217;s what it should be from the MS documentation. Do some searches. Any recognizable ASCII or Unicode data in places? Binary data?</p>
<p><a href="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-xml1.png"><img loading="lazy" decoding="async" class="alignleft wp-image-4423 size-full" title="Hex Editor display of XML/HTML data" src="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-xml1.png" alt="Hex Editor xml html data" width="533" height="64" srcset="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-xml1.png 533w, https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-xml1-300x36.png 300w" sizes="auto, (max-width: 533px) 100vw, 533px" /></a></p>
<p><a href="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-binary1.png"><img loading="lazy" decoding="async" class="alignleft wp-image-4421 size-full" title="Hex Editor display of unknown binary data" src="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-binary1.png" alt="Hex Editor binary data" width="259" height="78" /></a> <a href="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-zeroes2.png"><img loading="lazy" decoding="async" class="alignleft wp-image-4422 size-full" title="Hex Editor display of zeroed bytes" src="https://datarecovery.com/wp-content/uploads/2015/11/Hex-Editor-zeroes2.png" alt="Hex Editor zeroes" width="197" height="65" /></a></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>We recover data on a daily basis from drives that have had fresh Windows installs done on them that include a Quick Format. Quick Format is generally the default option in most situations (though now we know that&#8217;s no longer the case for the command line). It really depends on the overwrite damage in these cases, but we usually have good success.</p>
<p>The post <a href="https://datarecovery.com/rd/how-windows-format-command-line-behavior-changed/">How Windows Format Command Line Behavior Changed</a> appeared first on <a href="https://datarecovery.com">Datarecovery.com</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/

Object Caching 55/205 objects using Memcached
Page Caching using Disk: Enhanced 
Minified using Disk

Served from: datarecovery.com @ 2026-04-15 12:02:33 by W3 Total Cache
-->