Automatically wiping a lost or stolen hard-drive?

59

Solution 1

You have a few options depending on the hardware and nature of the sensitive data:

  • Modern hard-drives often allow you to set a password that is required to access it. Check the BIOS of the computer/laptop to see if there is a setting for this. Alternately, check the website for the drive's manufaturer to see if there is a software tool that let's you set the password.

    This does not erase the data, but makes it sufficiently difficult and expensive to access the data that unless there is super-duper important sensitive data, it should suffice.

  • If you are using a laptop, there are services like LoJack that you can subscribe to that install special hardware and software to allow you to remotely wipe it.

  • You can encrypt the data on the drive with BitLocker (included with Windows 7 Professional and higher), TrueCrypt, or other similar disk-encryption programs. That way, the whole drive is encrypted, and even getting to the data means nothing since it is usually sufficiently difficult/expensive to crack the encryption.

Solution 2

A hard-drive is just a hard-drive, it cannot possess any soft skills of its own.

If you want to have clean HD, you would have to manually format it before removing it from your pc.

There is no software available upto my knowledge that has the capability of deleting the data on removing or adding HD into a PC.

For sake of privacy, there are many options available, the simplest one may be the BitLocker Encryption provided default in Windows-7, just make a partition for your private data and make that partition secure with BitLocker.

There are also options to set HDD Access password at boot time, most of the BIOS-systems have this by default.

Solution 3

I know Dells and HP business laptops offer HDD Encryption that prevent the drive from turning on if the right password is not entered at boot, but I don't know of any software solutions that would do this. A software solution would require the software to be running to detect anything, and pulling a hard drive out of the host computer and putting it in another and NOT booting from the hard drive will prevent the program from running. So no, only if there is hardware level encryption; and, even then, it won't format or clean the hard drive

Share:
59

Related videos on Youtube

danny
Author by

danny

Updated on September 18, 2022

Comments

  • danny
    danny almost 2 years

    As we just migrated all projects to maven projects, one question came up and I couldn't find any suitable solutions yet.

    What if maven shuts down forever or just one artifact is not available anymore? Or what if some versions are not available anymore, and the software cannot run with the newer ones?

    Since we're not hosting a copy of the artifacts locally, should we host copies of every jar somewhere for such a scenario?

    Thanks

    • HikeMike
      HikeMike about 12 years
      Just use good encryption software.
    • soandos
      soandos about 12 years
      Put the hard hard drive in a safe that is rigged to blow if someone enters the wrong combination (or have it fill with acid, or some such thing)
    • user1078642
      user1078642 about 12 years
      @soandos: I do not want to harm no one - just make HD drives super clean=)... probably my own casing with raspberry pie's and batteries in each... just wondering if it can be done with out such modifications...
    • soandos
      soandos about 12 years
      @user1078642, I was joking, what you are trying to do is no possible.
    • Diogo
      Diogo about 12 years
      Let me just leave this article for future reference here: wwpi.com/…
  • Siarhei Kuchuk
    Siarhei Kuchuk about 12 years
    You may also read about TPM module on new devices
  • Synetech
    Synetech about 12 years
    @drweb86, I recall reading about them over a decade ago and how they are the worst thing since sliced bread. They are supposedly meant to prevent viruses and such (*cough*DEP/NX-bit*cough*) and unauthorized data access (relevant here), but most people complained that they would instead prevent users from using their computers freely (or worse), like video-game console lock-down on PCs. I have yet to see them really do anything significant one way or another (at least in actual computers; they may currently be used/useful in things like phones).
  • Scott Chamberlain
    Scott Chamberlain about 12 years
    @Synetech TPM was just a tempest in a teapot by people who did not understand what it did. All it really is, is just a hardware module to store your private/symmetric encryption keys in a reliable way that resists tampering. Now you can use such technology to do horrible DRM (you can see how having a system to securely store your media's decryption keys would be heaven for content producers) but no-one ever did it. Now it is just used as it was intended, to store thinks like your BitLocker keys or the hash of your fingerprint for an attached reader.
  • Synetech
    Synetech about 12 years
    @Scott, exactly, there was a lot of concern over what it could be used for, but little, if any of it actually seems to have happened. I'm pretty sure it was also meant to help reduce the ability of running unwanted/unauthorized software because the TPM consortium used the reduce-viruses tagline to explain that while the foil-hat consortium used the only-their-own/paid-programs-run tagline.
  • Siarhei Kuchuk
    Siarhei Kuchuk about 12 years
    As for BitLocker, TPM is important. Also there're some AES strength related policies in Windows, so you can improve them....
  • khmarbaise
    khmarbaise about 7 years
    Best is to install a repository manager within the company...and make there backup's from..as @JF Meier suggested...