Acronis privacyexpert 2003 Manuale Utente

Pagina di 43
 
 
Appendix A. Hard Disk Wiping algorithms 
Information removed from a hard disk drive by non-secure means (for 
example, by simple Windows delete) can easily be recovered. Utilizing 
specialized equipment, one may also be able to recover even repeatedly 
overwritten information. Therefore the problem of guaranteed data wiping is 
vital as never before. 
The  guaranteed wiping of information from magnetic media (e.g. a hard disk 
drive) means the impossibility of data recovery by a qualified specialist with 
the help of any known tools or recovery methods. 
This problem can be explained in the following way: Data is stored on a hard 
disk as a binary sequence of 1 and 0 (ones and zeros), represented by 
differently magnetized parts of a magnetic disk. 
Generally speaking, a 1 written to a hard disk is read as 1 by its controller, 
and 0 is read as 0. However, of you write 1 over 0, the result is conditionally 
0.95 and vice versa – if 1 is written over 1 the result is 1.05. These 
differences are irrelevant for the controller. However using special 
equipment, one can easily read the «underlying» sequence of 1 and 0. 
It only requires specialized software and inexpensive hardware to read data 
«deleted» this way by analyzing magnetization of hard disk sectors, residual 
magnetization of track sides and/or by using current magnetic microscopes. 
Writing to magnetic media leads to subtle effects summarized as follows: 
every track of a magnetic disk stores an image of every record ever written to 
it, but the effect of such record (magnetic layer) becomes more subtle as 
time passes. 
A.1 
Information Wiping Algorithms Functioning Principles 
Physically the complete wiping of information from a hard disk involves the 
switching of every elementary magnetic area of the recording material as 
many times as possible by writing specially selected sequences of logical 1 
and 0 (also known as samples). 
Using logical data encoding methods in current hard disks, you can select 
samples of symbol (or elementary data bit) sequences to be written to 
sectors in order to repeatedly and effectively wipe confidential information. 
Algorithms offered by national standards provide (single or triple) recording 
of random symbols to disk sectors that are straightforward and arbitrary 
decision, in general
, but still acceptable in simple situations. The most 
effective information wiping algorithm based on deep analysis of subtle 
Acronis PrivacyExpert 
41