I still think Thermite is your best option! Joe Fox Systems/Network Administrator
Mobile# (716) 846-9308 http://www.linkedin.com/in/josephfoxjr On Tue, Sep 23, 2008 at 11:15 AM, Oliver Marshall < [EMAIL PROTECTED]> wrote: > Ace, thanks Angus > > Olly > > -- > G2 Support > Online Backups > > Email: [EMAIL PROTECTED] > Web: http://www.g2support.com > > > > -----Original Message----- > From: Angus Scott-Fleming [mailto:[EMAIL PROTECTED] > Sent: 23 September 2008 15:02 > To: NT System Admin Issues > Subject: Re: Windows based secure disk eraser > > On 23 Sep 2008 at 10:59, Oliver Marshall wrote: > > > Hi gang, > > > > Does anyone have any recommendations of a secure disk erasing package > > for Windows? We currently use DBAN for erasing disks, which is fine > > where the disks are in the workstations or servers (we use it to wipe > > machines before giving them to charities etc) however, when we just > have > > a hard disk its more of a problem as we mainly use laptops. > > > > I'm after something that will let me slap the disks in to a USB/e-sata > > caddy and then wipe them to at least DoD standards, and ideally with a > > similar number of options to DBAN. > > > > So far the only one I can find that looks reliably...errrr...reliable > is > > Active@ KILL! (love the name). > > > > Any others? > > The Screen Savers! - Thermite PC > http://video.google.com/videoplay?docid=-4147847319296070400&q=techtv+th > ermite > > I think this one might do the trick: > > Eraser | Heidi - Internet Security and Privacy > http://www.heidi.ie/node/6 > > From the page: > > Eraser is an advanced security tool (for Windows), which allows you > to > completely remove sensitive data from your hard drive by overwriting > it > several times with carefully selected patterns. Works with Windows > 95, 98, > ME, NT, 2000, XP, Vista, Windows 2003 Server and DOS. > Eraser is Free software and its source code is released under GNU > General > Public License. > > The patterns used for overwriting are based on Peter Gutmann's paper > > "Secure Deletion of Data from Magnetic and Solid-State Memory" and > they > are selected to effectively remove magnetic remnants from the hard > drive. > > Other methods include the one defined in the National Industrial > Security > Program Operating Manual of the US Department of Defence and > overwriting > with pseudorandom data. You can also define your own overwriting > methods. > > -- > Angus Scott-Fleming > GeoApps, Tucson, Arizona > 1-520-290-5038 > +-----------------------------------+ > > > > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ > ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~ > ~ Finally, powerful endpoint security that ISN'T a resource hog! ~ ~ <http://www.sunbeltsoftware.com/Business/VIPRE-Enterprise/> ~