We all know how important security is (OK, the majority of us). When it comes time to purchase a new computer, what do most people do with the old? Sell it, throw it away, give it to our children or a family member to use, or just let it sit and collect dust. Many don’t think about the data stored on the hard drive of these computers. When selling it or giving it away, most just re-install the Operating System and send it on it’s way. Some of the more effective means of protecting your data would be to take the extra steps and melt down the platters or take a drill and punch holes through it. Now how many of us actually take the time or just have the time in general to do this, let alone think about it?
For those of us who leave the hard drives in tact, we must ensure some reasonable security of our data. How many of us are familiar with the filesystem? “Huh? Filesystem?” Your storage device has a table stored at the beginning of it that lists partitions that have been created there. For each partition, there is a table of contents that catalogs the locations of all files on the system.
Any time you delete a file from a filesystem, all you’re doing is deleting the file’s entry in the table of contents. The actual file stored on the disk. When future writes to the hard drive are made, those files may be overwritten by new files or by additions to old files, but unless and until that happens the data that makes up the file, itself, remains untouched. This means that someone with the right forensic software can often recover “deleted” files very easily.
So deleting the entire partition is better, right? Wrong. In fact, it could be worse. When you delete the partition, you not only leave the file data in place, but you also leave the table of contents that catalogs all the locations of files and file fragments in that filesystem. All that is deleted is the partition’s entry in the partition table.
For some good pointers on how to make sure your data is safe, take a peek at this article written by Chad Perrin.
Filed under: Applications, Co-location, Hosting, IT Security, Programming | Tagged: Data, File, File System, Hard Drive, Hardware, Internet, IT Security, PEER 1, Productivity, Storage, Storage Device, Technology, Tool, web 2.0, Web hosting, Windows |