User Tools

Site Tools


microsoft_windows:recycle

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Next revision
Previous revision
microsoft_windows:recycle [2024/07/15 01:27] – created rodolicomicrosoft_windows:recycle [2024/07/15 01:46] (current) rodolico
Line 5: Line 5:
 Following is almost as good as DBAN. Basically, you do a factory reset on your computer, erasing all of your data files, all of your accounts, and all of your programs. The only problem is, deleting a file does not actually delete the information on the disk itself; it just makes it inaccessible without using some third party tools. Your "free space" still has all of the information, it is just marked as "you can use this for new files." Following is almost as good as DBAN. Basically, you do a factory reset on your computer, erasing all of your data files, all of your accounts, and all of your programs. The only problem is, deleting a file does not actually delete the information on the disk itself; it just makes it inaccessible without using some third party tools. Your "free space" still has all of the information, it is just marked as "you can use this for new files."
  
-To actually erase all data in the free space (unused part of the hard drive), you can use the Windows built in command **cipher**+To actually erase all data in the free space (unused part of the hard drive), you can use the Windows built in command **cipher**. NOTE: this does not work 100% with SSD's (see note below).
  
   - Factory reset machine with wipe all programs/users   - Factory reset machine with wipe all programs/users
-  - Log in and set up as per your requirements +  - Allow Windows to do the reset (usually takes an hour or two) 
-  - reboot and shut down any processes you can+  - Set up as per your requirements 
 +  - reboot, then log in and shut down any processes you can
   - drop to an elevated command prompt   - drop to an elevated command prompt
-  - cipher /w:c:+  - Run the command <code>cipher /w:c:</code> and allow it to run (HOURS!!!)
  
-The last step will fill all empty space with 00, then ff, then rand, then exit, so basically a DoD Short disk cleanup. When done, retrieving any information off the free space on the hard disk is very difficult, if not impossible.+The last step will fill all empty space with 00's, then ff's, then random numbers, then exit, so basically a **DoD 5220.22-M three-pass** wipe (https://security.stackexchange.com/questions/117724/what-is-the-difference-between-the-different-wiping-methods-used-by-dban#139709). When done, retrieving any information off the free space on the hard disk is very difficult, if not impossible.
  
-**NOTE:** if you did not do a full erase on the factory reset, there may still be some files laying around. Also, the swap file will not be touched by this. 
 If you have more than the one drive, repeat cipher and change the c: to the drive letter If you have more than the one drive, repeat cipher and change the c: to the drive letter
 +
 +**NOTE:** if you did not do a full erase on the factory reset, there may still be some files laying around. Also, the swap file will not be touched by this.
  
 **NOTE:** this will take hours on large drives **NOTE:** this will take hours on large drives
 +
 +**NOTE:** This does not work for SSD's. For a nice article on securely erasing SSD's, see the article on [[https://www.tomshardware.com/how-to/secure-erase-ssd-or-hard-drive|Toms Hardware]].
 +
microsoft_windows/recycle.1721024865.txt.gz · Last modified: 2024/07/15 01:27 by rodolico