I still think Thermite is your best option!

Joe Fox
Systems/Network Administrator

Mobile# (716) 846-9308
http://www.linkedin.com/in/josephfoxjr


On Tue, Sep 23, 2008 at 11:15 AM, Oliver Marshall <
[EMAIL PROTECTED]> wrote:

> Ace, thanks Angus
>
> Olly
>
> --
> G2 Support
> Online Backups
>
> Email:  [EMAIL PROTECTED]
> Web:    http://www.g2support.com
>
>
>
> -----Original Message-----
> From: Angus Scott-Fleming [mailto:[EMAIL PROTECTED]
> Sent: 23 September 2008 15:02
> To: NT System Admin Issues
> Subject: Re: Windows based secure disk eraser
>
> On 23 Sep 2008 at 10:59, Oliver Marshall  wrote:
>
> > Hi gang,
> >
> > Does anyone have any recommendations of a secure disk erasing package
> > for Windows? We currently use DBAN for erasing disks, which is fine
> > where the disks are in the workstations or servers (we use it to wipe
> > machines before giving them to charities etc) however, when we just
> have
> > a hard disk its more of a problem as we mainly use laptops.
> >
> > I'm after something that will let me slap the disks in to a USB/e-sata
> > caddy and then wipe them to at least DoD standards, and ideally with a
> > similar number of options to DBAN.
> >
> > So far the only one I can find that looks reliably...errrr...reliable
> is
> > Active@ KILL! (love the name).
> >
> > Any others?
>
> The Screen Savers! - Thermite PC
> http://video.google.com/videoplay?docid=-4147847319296070400&q=techtv+th
> ermite
>
> I think this one might do the trick:
>
>    Eraser | Heidi - Internet Security and Privacy
>    http://www.heidi.ie/node/6
>
> From the page:
>
>    Eraser is an advanced security tool (for Windows), which allows you
> to
>    completely remove sensitive data from your hard drive by overwriting
> it
>    several times with carefully selected patterns. Works with Windows
> 95, 98,
>    ME, NT, 2000, XP, Vista, Windows 2003 Server and DOS.
>    Eraser is Free software and its source code is released under GNU
> General
>    Public License.
>
>    The patterns used for overwriting are based on Peter Gutmann's paper
>
>    "Secure Deletion of Data from Magnetic and Solid-State Memory" and
> they
>    are selected to effectively remove magnetic remnants from the hard
> drive.
>
>    Other methods include the one defined in the National Industrial
> Security
>    Program Operating Manual of the US Department of Defence and
> overwriting
>    with pseudorandom data. You can also define your own overwriting
> methods.
>
> --
> Angus Scott-Fleming
> GeoApps, Tucson, Arizona
> 1-520-290-5038
> +-----------------------------------+
>
>
>
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>
> ~ Finally, powerful endpoint security that ISN'T a resource hog! ~
> ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~
>

~ Finally, powerful endpoint security that ISN'T a resource hog! ~
~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/>  ~

Reply via email to