Free Republic
Browse · Search
General/Chat
Topics · Post Article

Skip to comments.

Vanity**Permanently Deleting Files
Vanity ^ | 12/10/2018 | Outofsalt

Posted on 12/10/2018 12:55:25 PM PST by outofsalt

With Windows 10 (and probably many other OS's) when you delete a file, be it email or others, it is not really deleted but is recoverable. I have a large bunch of "deleted" emails and quite a few personal records that I want to permanently remove from the hard drive. I am looking for suggestions on "shredder" programs (or are they all, "Apps" now?)


TOPICS: Computers/Internet
KEYWORDS: ccleaner; deletefiles; filesdelete; harddrive
Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-77 next last
To: outofsalt

HDD + driveway + hammer. It worked for Hillary.


21 posted on 12/10/2018 1:05:40 PM PST by READINABLUESTATE
[ Post Reply | Private Reply | To 1 | View Replies]

To: dead

Send in “da Clenser”
She’ll take care of it.


22 posted on 12/10/2018 1:08:04 PM PST by Leep (we need a Trump like leader for President 2024!)
[ Post Reply | Private Reply | To 6 | View Replies]

To: outofsalt

SDelete (https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete)
written by Mark Russinovich who is now the Chief Technology Officer for Windows Azure


23 posted on 12/10/2018 1:08:44 PM PST by tgdunbar
[ Post Reply | Private Reply | To 1 | View Replies]

To: WarlordBK

This is what I’m looking for!
Say I have a tax form saved in documents and I want it gone; How do I move it to “cipher/w:C:” or does it go to recycle bin first?
Dumb 2nd grader!


24 posted on 12/10/2018 1:08:54 PM PST by outofsalt (If history teaches us anything, it's that history rarely teaches us anything.)
[ Post Reply | Private Reply | To 18 | View Replies]

To: ImJustAnotherOkie

Unless it’s an SSD in which case, the FBI could still recover some of the data. Might want to melt it instead.


25 posted on 12/10/2018 1:09:22 PM PST by WarlordBK
[ Post Reply | Private Reply | To 20 | View Replies]

To: outofsalt

Just delete it, empty the recycle bin and then run cipher /w:C:\Documents\blahblahetc\


26 posted on 12/10/2018 1:10:07 PM PST by WarlordBK
[ Post Reply | Private Reply | To 24 | View Replies]

To: outofsalt

There are lots of free alternatives.

https://www.lifewire.com/free-data-destruction-software-programs-2626174


27 posted on 12/10/2018 1:13:09 PM PST by E. Pluribus Unum (Democracy dies when Democrats refuse to accept the result of a democratic election they didn't win.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: outofsalt

What’s her name?


28 posted on 12/10/2018 1:13:32 PM PST by coaster123
[ Post Reply | Private Reply | To 1 | View Replies]

To: WarlordBK

SSD? No problem break out the blow torch.

Analog rules!


29 posted on 12/10/2018 1:15:01 PM PST by ImJustAnotherOkie (All I know is what I read in the papers.)
[ Post Reply | Private Reply | To 25 | View Replies]

To: tgdunbar

All your 2nd graders a very smart!


30 posted on 12/10/2018 1:19:19 PM PST by outofsalt (If history teaches us anything, it's that history rarely teaches us anything.)
[ Post Reply | Private Reply | To 23 | View Replies]

To: WarlordBK
That's one DOS command I haven't used yet.

Question - why 521 not 512, in the Windows help file?

Microsoft Windows [Version 10.0.17134.407]
(c) 2018 Microsoft Corporation. All rights reserved.

C:/cipher /help
Displays or alters the encryption of directories [files] on NTFS partitions.

CIPHER [/E | /D | /C]
[/S:directory] [/B] [/H] [pathname [...]]

CIPHER /K [/ECC:256|384|521]

CIPHER /R:filename [/SMARTCARD] [/ECC:256|384|521]

CIPHER /P:filename.cer

CIPHER /U [/N]

CIPHER /W:directory

CIPHER /X[:efsfile] [filename]

CIPHER /Y

CIPHER /ADDUSER [/CERTHASH:hash | /CERTFILE:filename | /USER:username]
[/S:directory] [/B] [/H] [pathname [...]]

CIPHER /FLUSHCACHE [/SERVER:servername]

CIPHER /REMOVEUSER /CERTHASH:hash
[/S:directory] [/B] [/H] [pathname [...]]

CIPHER /REKEY [pathname [...]]

/B Abort if an error is encountered. By default, CIPHER continues executing even if errors are encountered.
/C Displays information on the encrypted file.
/D Decrypts the specified files or directories.
/E Encrypts the specified files or directories. Directories will be marked so that files added afterward will be encrypted. The encrypted file could become decrypted when it is modified if the parent directory is not encrypted. It is recommended that you encrypt the file and the parent directory.
/H Displays files with the hidden or system attributes. These files are omitted by default.
/K Creates a new certificate and key for use with EFS. If this
option is chosen, all the other options will be ignored.

Note: By default, /K creates a certificate and key that conform to current group policy. If ECC is specified, a self-signed certificate will be created with the supplied key size.

/N This option only works with /U. This will prevent keys being updated. This is used to find all the encrypted files on the local drives.
/R Generates an EFS recovery key and certificate, then writes them to a .PFX file (containing certificate and private key) and a .CER file (containing only the certificate). An administrator may add the contents of the .CER to the EFS recovery policy to create the recovery key for users, and import the .PFX to recover individual files. If SMARTCARD is specified, then writes the recovery key and certificate to a smart card. A .CER file is generated (containing only the certificate). No .PFX file is generated.

Note: By default, /R creates an 2048-bit RSA recovery key and certificate. If ECC is specified, it must be followed by a key size of 256, 384, or 521.

/P Creates a base64-encoded recovery-policy blob from the passed-in certificate. This blob can be used to set DRA policy for MDM deployments.
/S Performs the specified operation on the given directory and all files and subdirectories within it.
/U Tries to touch all the encrypted files on local drives. This will update user's file encryption key or recovery keys to the current ones if they are changed. This option does not work with other options except /N.
/W Removes data from available unused disk space on the entire volume. If this option is chosen, all other options are ignored. The directory specified can be anywhere in a local volume. If it is a mount point or points to a directory in another volume, the data on that volume will be removed.
/X Backup EFS certificate and keys into file filename. If efsfile is provided, the current user's certificate(s) used to encrypt the file will be backed up. Otherwise, the user's current EFS certificate and keys will be backed up.
/Y Displays your current EFS certificate thumbprint on the local PC.
/ADDUSER Adds a user to the specified encrypted file(s). If CERTHASH is provided, cipher will search for a certificate with this SHA1 hash. If CERTFILE is provided, cipher will extract the certificate from the file. If USER is provided, cipher will try to locate the user's certificate in Active Directory Domain Services.
/FLUSHCACHE Clears the calling user's EFS key cache on the specified server. If servername is not provided, cipher clears the user's key cache on the local machine.
/REKEY Updates the specified encrypted file(s) to use the configured EFS current key.
/REMOVEUSER
Removes a user from the specified file(s). CERTHASH must be the SHA1 hash of the certificate to remove.

directory A directory path.
filename A filename without extensions.
pathname Specifies a pattern, file or directory.
efsfile An encrypted file path.

Used without parameters, CIPHER displays the encryption state of the current directory and any files it contains. You may use multiple directory names and wildcards. You must put spaces between multiple parameters.

31 posted on 12/10/2018 1:20:16 PM PST by texas booster (Join FreeRepublic's Folding@Home team (Team # 36120) Cure Alzheimer's!)
[ Post Reply | Private Reply | To 18 | View Replies]

To: outofsalt

There’s a couple of ways to do it.

One will destroy the data on the drive - have a utility write random bits to every single sector of the drive seven times.

The other is to physically destroy the disk. Bring magnets, a metal cheese grater, and a sledgehammer.


32 posted on 12/10/2018 1:20:31 PM PST by thoughtomator (Number of arrested coup conspirators to date: 2)
[ Post Reply | Private Reply | To 1 | View Replies]

To: thoughtomator

I’m only looking to overwrite specific files not the whole enchilada.


33 posted on 12/10/2018 1:27:32 PM PST by outofsalt (If history teaches us anything, it's that history rarely teaches us anything.)
[ Post Reply | Private Reply | To 32 | View Replies]

To: READINABLUESTATE

Yes, and after she was done with the hammer & sickle, and the bleach bit, and her wobbly foot stomping tantrums, she disposed of it in an environmentally safe, earth-friendly manner.   (Remember that shiny object they discovered on Mars?   You got it - the missing e-mails!)   (The reason they call them e-mails is because they're extraterrestrial now!)


       

34 posted on 12/10/2018 1:35:20 PM PST by Songcraft
[ Post Reply | Private Reply | To 21 | View Replies]

To: outofsalt

bkmk


35 posted on 12/10/2018 1:36:27 PM PST by Sergio (An object at rest cannot be stopped! - The Evil Midnight Bomber What Bombs at Midnight)
[ Post Reply | Private Reply | To 1 | View Replies]

To: outofsalt

I use BleachBit, only worthwhile thing Hillary provided in my life. I used to use CCleaner, but read they had security issues.


36 posted on 12/10/2018 1:38:28 PM PST by teevolt
[ Post Reply | Private Reply | To 33 | View Replies]

To: outofsalt

First defrag your drive to concatenate all data ... then run a program that erases all fields with repeated overwrites INCLUDING slack space.


37 posted on 12/10/2018 1:45:57 PM PST by Neidermeyer (Show me a peaceful Muslim and I will show you a heretic to the Koran.)
[ Post Reply | Private Reply | To 1 | View Replies]

To: READINABLUESTATE
HDD + driveway + hammer

First encase the hard drive in a plastic bag, lest powdery, glassy debris fly all over the place. I learned the hard way.

38 posted on 12/10/2018 1:48:31 PM PST by Salvey
[ Post Reply | Private Reply | To 21 | View Replies]

To: outofsalt

Look into the Linux command - dd

https://www.marksanborn.net/security/securely-wipe-a-file-with-dd/


39 posted on 12/10/2018 2:13:39 PM PST by taxcontrol
[ Post Reply | Private Reply | To 1 | View Replies]

To: outofsalt

Be careful on those if you have an SSD. SSD have a limited number of times that they can be written to, and the way your average file shredder works is to write several times over that location.

Unless you have reason to believe someone is diving on your system, deleting it and doing your normal routine should be enough, just making sure that you remove the drive when you get rid of the system. Just the normal creating more files will help to scramble deleted data.


40 posted on 12/10/2018 2:17:12 PM PST by ferret_airlift
[ Post Reply | Private Reply | To 1 | View Replies]


Navigation: use the links below to view more comments.
first previous 1-2021-4041-6061-77 next last

Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.

Free Republic
Browse · Search
General/Chat
Topics · Post Article

FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson