Secure deletion of data from magnetic and solid-state memory
SSYM'96 Proceedings of the 6th conference on USENIX Security Symposium, Focusing on Applications of Cryptography - Volume 6
STACS'99 Proceedings of the 16th annual conference on Theoretical aspects of computer science
NIST Special Publication 800-88 Guidelines for Media Sanitization
NIST Special Publication 800-88 Guidelines for Media Sanitization
Hi-index | 0.00 |
In this article, we will describe a method to securely erase sensitive data in fully automated and hidden mode. Compared to other similar technologies, our method has two main advantages. The first one is the ability to run in a fully automated mode, in other words the system is configured once and the computer is protected without requiring any user intervention. The second advantage is the ability to run in a so-called secret mode, in which the system looks like another software, for the main purpose of confusing other users. Our paper will describe the structure and functionality of our system, and some of the most important technologies and algorithms that we have used.