Advances in data recovery have been made such that data can be reclaimed in many cases from hard drives that have been wiped and disassembled.
Security agencies use advanced applications to find cybercrime-related evidence. Also there are established industrial spy agencies adopting sophisticated channel coding techniques such as Partial Response Maximum Likelihood (PRML), a technique used to reconstruct the data on magnetic disks. Other methods include the use of magnetic force microscopy and recovery of data based on patterns in erase bands.
Although there are very sophisticated data recovery systems available at a high price, data can easily be restored with the help of an off-the-shelf data recovery utility like Active@ File Recovery (www.file-recovery.net), making your erased confidential data quite accessible.
Using Active@ ERASER, our powerful and compact utility, all data on your hard drive or removable floppy drive can be destroyed without the possibility of future recovery. After using Active@ ERASER, disposal, recycling, selling or donating your storage device can be done with peace of mind.
Active@ ERASER has several methods for data destruction that conform to :
- US Department of Defense clearing and sanitizing standard DoD 5220.22-M,
- German VSITR,
- Russian GOST p50739-95.
- More sophisticated methods like Gutmann's method are available as well.
You can be sure that once you wipe a disk with Active@ Eraser, sensitive information is destroyed forever.
Active@ Eraser is a quality security application that destroys data permanently from any computer that can be started using a DOS floppy disk.
Access to the drive's data is made on the physical level. Regardless of the operating system, file systems, this utility can destroy all data on all storage devices. Thus it does not matter operating systems and file systems located on the HDD, it can be DOS, Windows 95/98/ME, Windows NT/2000/XP, Linux, Unix for PC.
Active@ Eraser has Windows Explorer style GUI that is very intuitive and easy to use. Moreover, application can be run minimized (does not appear on the Taskbar) and tray icon associated with an application allows it to be activated easily.
User profile creation, scheduling and auto-launching features are also implemented.