For hard drive destruction, don’t put it in the microwave, don’t roast it on a spit, don’t soak it in acid, and don’t put it next to an industrial-strength magnet; the key is to make the drive’s platters unspinnable. The benefit of holding onto PC relics is not worrying about their data falling into the wrong hands. Not everyone is so attached to their old electronic equipment. You probably know that you need to completely wipe or remove the hard drives from your PCs before you donate or recycle them. How to ensure that the data on the drives will be out of the bad guys’ reach is another matter.
(On a related subject, don’t ever let a computer repair shop hold onto your old hard drive if they replace it. And don’t believe them if they say they returned the drive to the vendor. If they give you this spiel, call the cops and demand that they return the old hard drive to you, right then, right there.)
Free data-wiping program obliterates your data
If you want to keep the drive usable but totally erased, use the free Darik’s Boot and Nuke (DBAN), which comes in a version that runs off floppy disks and USB flash drives and another that runs off a CD or a DVD. The program’s interface won’t win any awards, but DBAN has a solid reputation among security experts.
Attack the platter to render a hard-disk unreadable
No matter how thorough a data-wiping program is, the only way to be certain that a hard drive’s data is unrecoverable is by rendering the drive’s platters unspinnable. I’ve heard and read all kinds of methods people use to destroy an old drive, some of which are downright dangerous.
Put it in a fire? There are lots of toxic chemicals in that gadget. Do you really want to be breathing them or otherwise releasing them into the environment? Microwaves are handy for destroying CDs and DVDs, but you’d have to cook a hard drive for a long, long time to blister the drive’s platters.
Several Web sites suggest soaking the drive in diluted hydrochloric or muriatic acid. This might work, but you run the risk of burning yourself or breathing toxic fumes. Lots of people recommend breaking out the power tools and drilling several holes through the drive. You can achieve the same effect by pounding some nails through it, or simply by whacking the heck out of it with a hammer, sledge or otherwise.
That you have decided to update your computer and you feel like it is time to dispose of the old computer or pass it on for E-waste IT asset recycling Chicago is a good thing. However, most people don’t have the slightest idea on how to safely dispose of their old PC or Mac. The truth is that we live in an age when hackers and cyber criminals have almost become a daily occurrence and they seem to live to make other people’s lives an agony. You, therefore, cannot afford to just throw away your old computer just the way it is; hard drive destruction enables you to deal with your banking info, private correspondence such that it becomes inaccessible to anyone who may want to steal such information. The worst-case scenario would be where you entire identity actually gets stolen.
When it comes to disposing of your computer, most ordinary users will imagine that the logical solution would be to delete everything off the computer; however, this is barely enough to keep the contents in your computer out of the way of the wrong hands. Your computer’s hard drive has a number of places where data becomes stored without completely getting rid of it. The safest and most effective way to ensure that your private information remains private is to ensure that the hard drive is physically destroyed through a system that is known as hard drive destruction.
Just like all the other important things in your life, hard drive destruction is best left to professional companies such as those that do electronics IT recycling Chicago. There is no doubt that if you have the time you can easily avail do-it-yourself video on YouTube showing how you can do your own hard drive destruction with most people that have an affinity for things electronics being able to accomplish quite a great deal. However, the greater majority of us are casual computer users. It goes without saying that we may not even come an inch close to doing harddrive destruction in the correct manner.
You can make your life easier by hiring a professional who will not only ensure that they have done hard drive destruction but also make sure that the dead hard drive goes through the right Shredding Company Service.
Shamoon—the mysterious disk wiper that popped up out nowhere in 2012 and took out more than 35,000 computers in a Saudi Arabian-owned gas company before disappearing—is back. Its new, meaner design has been unleashed three times since November. New wiper developed in the same style as Shamoon was discovered targeting a petroleum company in Europe. Wipers used in the Middle East have not previously been seen.
Researchers from Moscow-based antivirus provider Kaspersky Lab have dubbed the new wiper “StoneDrill.” They found it while researching the trio of Shamoon attacks, which occurred on two dates in November and January. The refurbished Shamoon 2.0 added new tools and techniques. It include less reliance on outside command-and-control servers, a fully functional ransomware module, new 32-bit and 64-bit components.
StoneDrill, features an impressive ability to evade detection by, among other things, forgoing the use of disk drivers during installation. To accomplish this, it injects a wiping module into the computer memory associated with the user’s preferred browser. StoneDrill also includes backdoor functions that are used for espionage purposes. Kaspersky researchers found four command-and-control panels that the attackers used to steal data from an unknown number of targets. Besides sharing code similarities with Shamoon, StoneDrill reuses code used in espionage campaign dubbed “NewsBeef,” targeted organizations around the world.
“The discovery of the StoneDrill wiper in Europe is a significant sign. The group is expanding its destructive attacks outside the Middle East. Kaspersky Lab researchers wrote in a 35-page report published Monday. “The target for attack appears to be large corporation with wide area of activity in the petrochemical sector. With no apparent connection or interest in Saudi Arabia.”
The researchers still don’t know precisely what connection StoneDrill has with Shamoon. The most plausible relationship, is that each belongs to different hacking groups that are aligned in their interests. This theory is consistent with the discovery that StoneDrill contains support for Arabic-Yemen language. While Shamoon contains mostly Persian language support. The Persian-speaking Iran and Yemen “are both players in the Iran-Saudi Arabia proxy conflict,” researchers noted in Monday’s report.
The researchers noted the possibility that one or both of the embedded language sections are “false flags”. Intended to mislead investigators about the origins of the malware. StoneDrill, less-used wiper that’s deployed in certain situations by the same group that uses Shamoon. It’s also possible that StoneDrill and Shamoon are used by two different groups that have no connection to each other. It just happened to target Saudi organizations at the same time.