![]() However, you know what? A new hacker acts in this manner. Why would hackers invade a device? The majority of consumers believe that hackers seek ransom payments in exchange for their data. Only you can make yourself more secure.In this article, we explore the best file-shredder software that can shield your computer from hackers accessing private data. Your complaint, whilst valid, is easily overcome by one of the simple methods above. if you’re concerned about filenames, use full disk encryption or use less descriptive filenames.if you don’t want physical destruction, use full disk encryption.if your data is that sensitive, physically destroy the drive.We’re not being obtuse but we can’t entertain an argument without logical foundation: ![]() If your data is so sensitive then you’ll be using full disk encryption. No sense of security is better than a false sense of security. Just not getting the warm fuzzies anymore. It never has purported to securely erase filenames.ģ. It does it’s job – it makes recovering a file very difficult. The ‘flaws’ in secure deletion aren’t unique to AxCrypt, they’re present in every “secure” delete program out there. It’s your responsbility to understand the limitations of any technology you use. It’s the user’s responsibility to keep themselves abreast of technological changes.Ĭaveat emptor. You were safe, for years… until newer hard drives came out. ![]() On old hard drives you could effectively perform a secure delete. ![]() So it bothers me that I’ve been using this stuff for years and have only just now tested the efficacy of the “shredding” I’ve been doing (with undesirable results)…and to have this randomly happen with Axcrypt now too. “In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old MFM methods (if you don’t understand that statement, re-read the paper)”Ģ. There are lots of ignorant computer users out there who believe that a Guttman pass is the most secure because it has the highest number of passes they should educate themselves. It’s not us implying anything Guttman outright stated it’s a waste of time and always has been. I’m very surprised that you guys are implying that even Eraser (when using Guttman’s passes) is still not effective! Just not getting the warm fuzzies anymore.ġ. And so it just so happened that this morning Axcrypt decided to not finish it’s job when walking through it’s “Secure Delete” for one particular file. It’s interesting that with all the reviews I’m seeing about that one and others like it, I’m very surprised that you guys are implying that even Eraser (when using Guttman’s passes) is still not effective!Īnd by the way, I have to delete many previous versions of files at work, which I’ve chosen to do using Axcrypt for years, and eventually follow up at times with a CCleaner wipe. It wasn’t until actually using Glarisoft to shred them, that Glarisoft was unable to recover them…and at that I used their 10-pass option. Glarisoft recovered files with names intact but, as I said before, none of them could be opened. So in testing this out, I “shredded” using Axcrypt followed by CCleaner wiping free space and MFT 7 passes. Most of those shredders can do the MFT, including CCleaner.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |