Protecting Deleted Files - Tech Learning

Protecting Deleted Files

Listen to this podcast Over the last 6 months, I've had to explain to several folks that simply because you delete files on your computer, it does not mean that they are "safe" and "unrecoverable." In fact, it is a relatively simple manner to undelete files off your computer. This is especially
Publish date:

Listen to this podcast

Over the last 6 months, I've had to explain to several folks that simply because you delete files on your computer, it does not mean that they are "safe" and "unrecoverable." In fact, it is a relatively simple manner to undelete files off your computer. This is especially true when undeleting files from hard drives on computers sent out for disposal, especially when little has been done to remove the data. Often, reimaging a hard drive just is not enough. With the real threat of identity theft, it is much too dangerous to not establish a regular pattern of wiping your hard drive's "free space" to get rid of deleted files.

In previous columns, I recommended using Pretty Good Privacy (PGP) or Cryptainer LE to encrypt sensitive files. Yet, everything you do leaves traces of information on your computer that others can access. You should consider using programs like those mentioned below to ensure your privacy after using a computer. One such free utility is Eraser 5.7. It allows you to permanently erase files, just like the free PGP software, so that they are unrecoverable, even by "forensic" methods used by government and the FBI (ok, ok...but isn't it nice to know that it's that high a quality program?). While this may seem a bit extreme, even paranoid, remember that at some time, we all deal with confidential information on our computers. Would you want that data accessible to someone should your computer be stolen or accessed inappropriately?

Eraser has a free hard drive reformatting utility that can temporarily remove asset tracking programs like Absolute Software's CompuTrace. The removal is temporary because newer versions of CompuTrace — installed to the BIOS — can reinstall themselves ONLY IF a thief installs the Windows Operating System. Note that loading Linux onto the hard drive — and wiping out the Windows OS installation — will nullify the protection offered by CompuTrace. This is important to know, especially for organizations who might choose to use this expensive software in lieu of other security methods (e.g. cables to secure computer equipment). CompuTrace will NOT work if the computer is formatted with a utility like Darik's Boot-n-Nuke, and loaded with another operating system besides Windows. While CompuTrace will protect against the casual thief, as computer criminals become more technology proficient and learn to load Linux on stolen machines, this sytem of protection will be even less effective.

Absolute Software's Chief Executive Officer, John Livingston, shares, "Most of our customers run Windows or a Mac OS. These are the OS’s we support today. Linux, while a great OS, only has one percent of the install base, and we don’t support it at this time. Also please keep in mind than the people who steal these computers from schools are not as computer capable...they are probably not running Linux. Computer thieves are often fencing the stolen equipment for $100 to get their next fix. They will typically sell the PC - as is - to a local pawn shop or re-install Windows and use the PC themselves or sell the PC on eBay. In these scenarios’, Windows typically gets loaded, we locate the computer and break the theft ring that’s been plaguing the school."

In addition to protecting your email privacy, you may also want to consider the following free utilities available from JavaCool Software, the same folks that made SpywareBlaster.

  • MRU Blaster: Protect your privacy - find and remove over 30,000 most recently used lists and other stores of hidden information.
  • ID-Blaster: Destroy tracking tactics by randomizing GUID/Unique ID numbers found on your computer.
  • DocScrubber: Removes critical information that you might be inadvertently revealing through your Microsoft Word documents.

And, what's the new software I found recently? Well, it's called Win-Privacy Tools (WinPT). "Windows Privacy Tools (WinPT) is a collection of multilingual applications for easy digital encryption and signing of content. It's GnuPG-based, compatible with OpenPGP compliant software (like PGP) and free for commercial and personal use under the GPL. " ().

I also put together a quick tutorial on how to use Eraser to wipe data off your hard drive. It's very simple and can fit on a floppy disk. I hope these are useful to you as you protect your privacy. I also encourage you to read the following:

Tool Link(s):



Protecting Your Digital Privacy

Listen to this podcast From banks to school districts to the Veterans Administration, every other week, we hear about some other individual who has jeopardized confidential information for millions of people. This article is about how YOU can maintain your digital privacy on your computer. Consider these

Protecting Myself from Spyware and Adware

Listen to this podcast "What are all these windows open on my screen?” a campus administrator asked me recently. Unfortunately, windows were appearing on her personal laptop's screen at an alarming rate. She had Adware! Adware sometimes causes advertising banners to appear on your screen in multiple,

Compressing Multiple Files to Email

Listen to this podcast Sending Email attachments is easy, but can cause a lot of trouble for the recipient. Before you send an Email message, contact the recipient and agree on a compression format. Compression programs work like electronic suitcases. A suitcase allows you to carry your clothes relatively neatly on

Storing Files Online

Listen to this podcast Ever had to email a large file — whether it's a multimedia slide show, zipped file, digital photo, or video — to someone only to find that they didn't have enough email storage capacity in their email to receive it? Or, worse, that you lacked the storage to send the file? While you

Finding Files

Listen to the podcast Question: I've downloaded some files from the Internet, but now I can't find them. (Or, I've downloaded files from the Internet, and they're all over my desktop.) How do I control where the files go? The IT Guy says: One of the more common issues that I see working with people and

Backing Up Files

Question: What's good back up software to save all Data for Quicken, Outlook and other data? The IT Guy says: Backing up your computer files generally requires two things: backup media and backup software. If you are on a network at school, have a network folder and sufficient storage space, one of the best ways

Backing Up Your Hard Drive

Subscribe to TechTips RSS Feed Listen to this podcast If you have ever reformatted a computer, reloaded it with software by loading the programs one by one, you know it can be a time-consuming process. As a matter of fact, I recall spending many an hour loading software with a book in hand (pleasure reading, not