killdisk.pdf

(318 KB) Pobierz
killdisk3.book
User Guide
Version Number 3.0
37000050.002.png
Copyright © 2003, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any
form or by any means or used to make any derivative work (such as translation, transformation, or adaptation) without written
permission from LSOFT TECHNOLOGIES INC.
LSOFT TECHNOLOGIES INC. reserves the right to revise this documentation and to make changes in content from time to time
without obligation on the part of LSOFT TECHNOLOGIES INC. to provide notification of such revision or change.
LSOFT TECHNOLOGIES INC. provides this documentation without warranty of any kind, either implied or expressed, including,
but not limited to, the implied warranties of merchantability and fitness for a particular purpose. LSOFT may make improvements
or changes in the product(s) and/or the program(s) described in this documentation at any time.
All technical data and computer software is commercial in nature and developed solely at private expense. As the User, or Installer/
Administrator of this software, you agree not to remove or deface any portion of any legend provided on any licensed program or
documentation contained in, or delivered to you in conjunction with, this User Guide.
Active@ Killdisk, the Active@ Killdisk logo, Killdisk and Erasers Software are trademarks of LSOFT TECHNOLOGIES INC.
LSOFT.NET logo is a trademark of LSOFT TECHNOLOGIES INC.
Other brand and product names may be registered trademarks or trademarks of their respective holders.
Contents
Standards Used in This Guide ........................................................................................... iv
O VERVIEW
Deleting Confidential Data ..................................................................................................5
Advanced Data Recovery Systems ...............................................................................5
International Standards in Data Removal ......................................................................6
SYSTEM REQUIREMENTS
Personal Computer Minimum Requirements ......................................................................7
Drive Storage System ....................................................................................................7
Active@ KillDisk Version.....................................................................................................8
What’s New in Version 3.0 .............................................................................................8
R UNNING A CTIVE @ K ILL D ISK
Preparing a DOS-Bootable Floppy Disk..............................................................................9
System Formatting.........................................................................................................9
Copying Active@ KillDisk to a Floppy..........................................................................10
Labeling the Disk .........................................................................................................10
One-Step Method.........................................................................................................10
Modes of Operation ..........................................................................................................10
DOS Interactive Mode .................................................................................................11
DOS Command Line Mode ...............................................................................................15
Autoexecute Mode ............................................................................................................17
Erasing Data Using Autoexecute .................................................................................17
Erasing Logical Drives (Partitions) ....................................................................................18
Erase Operation Complete ...............................................................................................20
COMMON QUESTIONS
I cannot boot the machine from a floppy. What is wrong? ...........................................21
Which operating systems are supported by Active@ KillDisk? ...................................21
How is the data erased? ..............................................................................................21
E RASING P ARAMETERS
Number of Passes ............................................................................................................23
One Pass Zeros or One Pass Random .......................................................................23
User Defined ................................................................................................................23
US DoD 5220.22-M .....................................................................................................23
German VSITR ............................................................................................................23
Russian GOST p50739-95 ..........................................................................................23
Gutmann ......................................................................................................................23
Verification ........................................................................................................................23
37000050.003.png
Retry Attempts..................................................................................................................24
Ignore Errors..................................................................................................................... 24
Clear Log File before Start................................................................................................ 24
Skip Confirmation ............................................................................................................. 24
Standards Used
in This Guide
The following standards are used to provide more concise documentation:
Table 0-1 User Input
Description
Example
Action
Bold text within square
brackets
Press [Enter] .
Press the key on the keyboard that
corresponds to the message within square
brackets.
Bold text and operand
within square brackets
Press [Ctrl + B]
Together, press the combination of keys
within the square brackets.
Bold text
Click OK .
With the mouse pointer, find the icon or
button indicated and left-click that icon.
Letter "i" in the left
margin
i
Information worthy of noting.
Exclamation mark in
the left margin
!
Important information that may cause the
utility to behave incorrectly and may
damage data as a result.
37000050.004.png
1
O VERVIEW
This chapter gives an overview of Active@ KillDisk application.
Deleting
Confidential Data
Modern methods of data encryption are deterring unwanted network attackers
from extracting sensitive data from stored database files. Unfortunately,
attackers wishing to retrieve confidential data are becoming more resourceful
by looking into places where data might be stored temporarily. A hard drive on
a local network node, for example, can be a prime target for such a search. One
avenue of attack is the recovery of supposedly-erased data from a discarded
hard disk drive. When deleting confidential data from hard drives or removable
floppies, it is important to extract all traces of the data so that recovery is not
possible.
Most official guidelines around disposing of confidential magnetic data do not
take into account the depth of today’s recording densities. The Microsoft DOS
del command merely changes the file name so that the operating system will
not look for the file. The situation with NTFS is similar.
Removal of confidential personal information or company trade secrets in the
past might have used the format command or the DOS fdisk command.
Ordinarily, using these procedures gives users a sense of confidence that the
data has been completely removed.
The format utility actually creates new FAT and ROOT tables, leaving all
previous data on the disk untouched.
fdisk merely cleans the Partition Table (located in the drive's first sector) and
does not touch anything else.
When you use Active@ KillDisk , you can scan drives and view all files on
them - including files that have been deleted using the Microsoft DOS del
command.
Advanced Data
Recovery Systems
Advances in data recovery have been made such that data can be reclaimed in
many cases from hard drives that have been wiped and disassembled. Security
agencies use advanced applications to find cybercrime-related evidence. Also
there are established industrial spy agencies adopting sophisticated channel
coding techniques such as Partial Response Maximum Likelihood (PRML), a
technique used to reconstruct the data on magnetic disks. Other methods
include the use of magnetic force microscopy and recovery of data based on
patterns in erase bands.
Although there are very sophisticated data recovery systems available at a high
price, data can easily be restored with the help of an off-the-shelf data recovery
utility like Active@ File Recovery (www.file-recovery.net ) or Active@
UNERASER (www.uneraser.com ) , making your erased confidential data quite
accessible.
 
37000050.001.png
Zgłoś jeśli naruszono regulamin