Prevent disclosure of privacy and let your private files "crumble"

Source: Internet
Author: User
Tags format interface

Not long ago, a US company said that the deleted information in the phone could easily be recovered. The elimination of the old mobile phone may reveal privacy or trade secrets, which has aroused the vigilance of mobile phone users around the world.

In fact, for faster deletion of information, mobile phones, computers and other electronic products actually only delete the information stored in the main boot area, file address, information, file content still remain on the memory card and disk, through specific software can indeed recover.

Similarly, under Windows, empty the Recycle Bin, or use "shift+delete" to delete files directly, in DOS, the use of the "del command" to delete files, and even the hard disk repartition and format, this series of our usual operation can not be completely deleted files. Using FinalData, Recover NT and other tool software, it is easy to recover.

This pseudo deletion of the operating system, although it can make up some of our mistakenly deleted losses, but for some with trade secret or personal privacy of the document may be a person with ulterior motives to be recovered and stolen or leaked. How can these documents be shattered and left without traces? The general use of special files to completely remove the tool or the hard drive low-level format.

First, the basic mechanism of document deletion

Files stored on disk are divided into file headers and data areas. General delete operation, the system simply modifies the first 2 code of the file header, which is mapped in the File allocation table (FAT), deletes the file, and zeroes the file's cluster number in the FAT table, indicating free space and increased disk space. The real file content is still stored in the data area and is not completely deleted. Only when new data is written will the system automatically overwrite the contents of the file marked for deletion, so that the original data is completely deleted. Similarly, the use of Fdisk partitioning and format formatting also only modifies the disk partition table and the Fat table separately, and does not completely remove the data from the data area. This pseudo deletion of the operating system greatly improves the efficiency of the system to delete files.

In fact, to completely delete the data, only delete the file in the data area completely clear "0." This principle is used by most unrecoverable removal tools: repeatedly writing useless data to the data area of the deleted file and overwriting it multiple times to complete the deletion of the file.

Second, the complete removal of documents tool

There are a lot of files that are not recoverable, such as file Pulverizer, clean disk security (disk safety cleanup software), file Eraser (document Erasure tool), and so on, with similar features. The following is a "File pulverizer" as an example of the use of such software.

After installation and operation, its main interface is shown in Figure 1. Click the Add File button on the main interface to open the Select File dialog box and select the file you want to smash. You can hold down the Shift or CTRL key to add multiple files at once. When you are sure, the selected file appears in the list on the left. To smash all the files in a folder, select "Add Directory" on the main interface and select a directory to be crushed. The software also supports drag-and-drop operations to delete files and directories, directly to the main interface of the "File/folder" list in the blank, files and directories will be displayed in the list. Click the Start Smash button to start removing the selected files and directories completely. If you do not want to delete some files or folders that have been added to the file list, you can select them in the file list, and then click Remove List to remove them from the list.

  

  

Figure 1 File Pulverizer The main interface Figure 2 the "Remove with files Shredder" option in the right-click menu

In addition, the file grinder and the operating system is closely combined, in the Explorer right click on the file or folder you want to delete, in the right menu will be more than a "File grinder delete" option. This makes it easy to delete files and folders without having to start it, and is as convenient as using Windows Delete commands. It is important to note that the software deleted files will no longer be restored, so be sure to use carefully.

Third, HDD low-level format

Low-level formatting is typically done at the end of the hard drive, as long as the average user uses other tools for partitioning and advanced formatting. However, when you delete hard disk data or repair some large bad sectors, you also need to lower the hard disk format. HDD Low-level format tool Lformat can only be used in DOS, it rewrites each sector of the hard disk, each track to rewrite the operation, so that the hard drive to completely delete the information.

Tool Lformat is not difficult to use, but using this software will cause all data on your hard disk to be lost and unrecoverable. Therefore, the actual operation must be extra careful to see the prompts and instructions for each step. It is best to back up all data before you operate. If your computer has multiple hard drives, it is recommended that you unplug the other hard drives before using the software. Safekeeping Figure 3 provides a step-by-step interface for users to confirm that they want the selected hard disk to be formatted during the Lformat use process.

  

In short, simple deletion of files is dangerous for trade secrets and important privacy data. I suggest you pay more attention, choose the right way to protect your data to the maximum security.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.