Video – How To Erase Data Permanently in Windows with Cipher

Home > Blogs > Security > Video – How To Erase Data Permanently in Windows with Cipher

Video – How To Erase Data Permanently in Windows with Cipher

Like This Blog 0 Mike Danseglio
Added by November 30, 2012

Most computer users think that when they empty the Recycle Bin, that data is gone forever. Unless the FBI or Interpol decide to use a scanning electron microscope, there’s no way someone can recover the information. Right?

Wrong.

That data is usually still laying around on the hard drive. Data remnants, or pieces of information that you don’t know about, can be on a computer for just a short time. But they can also remain there indefinitely.

Is there a way to erase the data permanently? Sure! In this video I explain a great feature built into Windows called Cipher /w (the w is for wipe).

Cipher /w wipe switch How to remove data from a hard drive

Take a look at the video to see why you’d use it and exactly how it works by writing 0’s, 1’s, and pseudorandom hash values to only the unused parts of the hard drive. You’ll see how this erases unwanted data remnants while still preserving the data you want to keep.

Enjoy and be well.

Mike Danseglio -CISSP
Interface Technical Training – Technical Director and Instructor

Videos You May Like

Agile Methodology in Project Management

0 130 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 570 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 525 3

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.