microsoft_windows:recycle
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
microsoft_windows:recycle [2024/07/15 01:27] – created rodolico | microsoft_windows:recycle [2024/07/15 01:46] (current) – rodolico | ||
---|---|---|---|
Line 5: | Line 5: | ||
Following is almost as good as DBAN. Basically, you do a factory reset on your computer, erasing all of your data files, all of your accounts, and all of your programs. The only problem is, deleting a file does not actually delete the information on the disk itself; it just makes it inaccessible without using some third party tools. Your "free space" still has all of the information, | Following is almost as good as DBAN. Basically, you do a factory reset on your computer, erasing all of your data files, all of your accounts, and all of your programs. The only problem is, deleting a file does not actually delete the information on the disk itself; it just makes it inaccessible without using some third party tools. Your "free space" still has all of the information, | ||
- | To actually erase all data in the free space (unused part of the hard drive), you can use the Windows built in command **cipher** | + | To actually erase all data in the free space (unused part of the hard drive), you can use the Windows built in command **cipher**. NOTE: this does not work 100% with SSD's (see note below). |
- Factory reset machine with wipe all programs/ | - Factory reset machine with wipe all programs/ | ||
- | - Log in and set up as per your requirements | + | - Allow Windows to do the reset (usually takes an hour or two) |
- | - reboot and shut down any processes you can | + | - Set up as per your requirements |
+ | - reboot, then log in and shut down any processes you can | ||
- drop to an elevated command prompt | - drop to an elevated command prompt | ||
- | - cipher /w:c: | + | - Run the command < |
- | The last step will fill all empty space with 00, then ff, then rand, then exit, so basically a DoD Short disk cleanup. When done, retrieving any information off the free space on the hard disk is very difficult, if not impossible. | + | The last step will fill all empty space with 00's, then ff's, then random numbers, then exit, so basically a **DoD 5220.22-M three-pass** wipe (https:// |
- | **NOTE:** if you did not do a full erase on the factory reset, there may still be some files laying around. Also, the swap file will not be touched by this. | ||
If you have more than the one drive, repeat cipher and change the c: to the drive letter | If you have more than the one drive, repeat cipher and change the c: to the drive letter | ||
+ | |||
+ | **NOTE:** if you did not do a full erase on the factory reset, there may still be some files laying around. Also, the swap file will not be touched by this. | ||
**NOTE:** this will take hours on large drives | **NOTE:** this will take hours on large drives | ||
+ | |||
+ | **NOTE:** This does not work for SSD's. For a nice article on securely erasing SSD's, see the article on [[https:// | ||
+ |
microsoft_windows/recycle.1721024865.txt.gz · Last modified: 2024/07/15 01:27 by rodolico