Should important confidential documents be deleted or shattered?

Source: Internet
Author: User
Tags delete key

Important confidential documents, completely deleted is absolutely safe? After we install rising anti-virus software, usually in the right mouse button appears a "File Smash" option, it and our usual file delete what is the difference? How did it play the role of "Smash" file?

The ability to "delete" and "Smash"

When should you delete it? When should it be crushed? In short, after deleting the file, when we find that the deletion of important data, we can restore it in some way, and smash the file is not recoverable, it will completely remove the file data from the hard disk partition, the normal way will not be able to recover, For example, some special privacy documents do not want to be restored by others (such as the use of other U disk copy things), you can take the "file crushing" approach to "destroy the Corpse".

Ask the bottom of the root, what is different between the two brothers

There are two types of deleted files in Windows: One is the normal deletion, that is, after we select the file, press the keyboard Delete button or in the right mouse button select "Delete" option, just put the file to the Recycle Bin, you can recover, mistakenly deleted after the document also has "regret medicine" to eat; When you press the Shift+delete key after selecting the file, the deleted file will not be moved to the Recycle Bin and removed directly from the hard disk partition.

However, these two methods after the deletion of the file if the hard disk partitions do not read and write, the file data information is still "retained" in the hard disk data area, through some hard disk management tools or data recovery software (such as Easyrecovery), the deleted files are easily recovered.

File shredding, as the name suggests, is to remove the files on the computer without leaving traces. Use some file shredding tools to do this.

Why is there a regional difference? The Windows file system includes FAT systems such as FART12, FAT16, FAT32, and the NTFS file system. In the FAT file system, if you create a file, you need to open a "distribution table" on disk, just like a library bibliography. This table includes a pointer to the address of the file's contents. The system then reads and writes the file at the address it points to. At the same time, other files, if they are to be created, are prohibited from pointing at this address to prevent file confusion. and the operating system to delete files is much more convenient: directly to the "Bibliography" to destroy the sale can be. The address that the "Bibliography" points to is considered empty. The data in the computer is made up of binary, which appears as "concave" and "convex" on the disk. Because the system cannot predict the details of the file that will be deposited, the contents of the file can be considered random. By mathematical Knowledge, "0" and "1" on the disk have no effect on the speed of the re writing information.

Our information may be detected by uninvited visitors, can be based on the clues on the disk to re-establish the entire file, or a part of the file, so as to pry into our privacy. "File shredding" deletes content and "Bibliography", and the contents of the file are not known to anyone. And the general file shredding software can be word, WPS and other tools in the history and system created temporary files deleted, so that no one can know our privacy.

Delete operation, "regret medicine" eat safe and secure

In the day-to-day Office applications, encountered unwanted documents are always readily deleted, when found after the deletion of the big cry for help, so may wish to delete the file into the Recycle Bin, and before the deletion to confirm. Stone-click the Recycle Bin icon on the desktop, select Properties, and on the Global tab, make sure the Show Delete confirmation dialog box is selected (see Figure 1) so that each deletion prompts you to delete the file into the Recycle Bin, even if you find the file deleted accidentally, you can go to the Recycle Bin to select the file and restore it. For a second operation or even directly press the Ctrl+z key, delete the file immediately back. For some documents that do not need to be confirmed, do not want others to use some way to recover, can be directly "broken". If you have a rising antivirus set installed in your computer, right-click on the file (folder) you want to smash to select "Smash file", will open the File Shredder window, if you need to smash other files, and then drag and drop into the Shredder window, click "Start" to start smashing (see Figure 2).

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.