How safely does reinstalling Windows wipe old data?
Clash Royale CLAN TAG#URR8PPP
up vote
5
down vote
favorite
I've got a set of computers that have had privileged information on that I want to be able to re-use. If I used a Windows boot drive to re-install Windows, how sufficient would that be towards keeping the old data safe?
I'm aware that the only sure way to secure the data is by grinding the hard drives into a fine powder, but how 'good enough' is it? If it's not good enough, is there an alternative that leaves the hardware intact that is functionally good enough, assuming that incredibly powerful people don't want my data, who'd just break out the pliers and get it anyway.
Extra points that I'm interested in, but are tangentially related to the question so aren't required for an answer is; what other issues am I likely to run into if I were to give/sell these computers on? (My organisation owns the computers and the licences for Windows, and would like to offer them to employees once we're done with them). I believe there's an issue with transferring the Windows licence, for example.
windows hard-drive security wipe
 |Â
show 5 more comments
up vote
5
down vote
favorite
I've got a set of computers that have had privileged information on that I want to be able to re-use. If I used a Windows boot drive to re-install Windows, how sufficient would that be towards keeping the old data safe?
I'm aware that the only sure way to secure the data is by grinding the hard drives into a fine powder, but how 'good enough' is it? If it's not good enough, is there an alternative that leaves the hardware intact that is functionally good enough, assuming that incredibly powerful people don't want my data, who'd just break out the pliers and get it anyway.
Extra points that I'm interested in, but are tangentially related to the question so aren't required for an answer is; what other issues am I likely to run into if I were to give/sell these computers on? (My organisation owns the computers and the licences for Windows, and would like to offer them to employees once we're done with them). I believe there's an issue with transferring the Windows licence, for example.
windows hard-drive security wipe
3
After re installation overwrite all free space then you are good to go....howtogeek.com/137108/â¦
â Moab
19 hours ago
3
You do understand you can just Reset Windows 10, choose to keep nothing, and and you will get the results you want? If these are Enterprise editions, it will be more difficult, for the new owners since they wonâÂÂt be able to activate them due to loss of the KMS. Volume licenses must communicate with the KMS once every 180 days.
â Ramhound
19 hours ago
1
Once old data is overwritten by re installation and free space overwrite, nothing can be recovered.
â Moab
19 hours ago
@Moab That sounds like an answer to me, pulling the contents of that article into one would get my upvote :)
â Yann
19 hours ago
2
@Yann - So instead just install Windows with the generic key, and leave it to the new owner, to change the license key. I personally would, encrypt the data with BitLocker, then just format the HDD and reinstall an unlicensed installation of Windows. This makes data recovery impossible and the burden of getting a license somebodyâÂÂs else problem
â Ramhound
19 hours ago
 |Â
show 5 more comments
up vote
5
down vote
favorite
up vote
5
down vote
favorite
I've got a set of computers that have had privileged information on that I want to be able to re-use. If I used a Windows boot drive to re-install Windows, how sufficient would that be towards keeping the old data safe?
I'm aware that the only sure way to secure the data is by grinding the hard drives into a fine powder, but how 'good enough' is it? If it's not good enough, is there an alternative that leaves the hardware intact that is functionally good enough, assuming that incredibly powerful people don't want my data, who'd just break out the pliers and get it anyway.
Extra points that I'm interested in, but are tangentially related to the question so aren't required for an answer is; what other issues am I likely to run into if I were to give/sell these computers on? (My organisation owns the computers and the licences for Windows, and would like to offer them to employees once we're done with them). I believe there's an issue with transferring the Windows licence, for example.
windows hard-drive security wipe
I've got a set of computers that have had privileged information on that I want to be able to re-use. If I used a Windows boot drive to re-install Windows, how sufficient would that be towards keeping the old data safe?
I'm aware that the only sure way to secure the data is by grinding the hard drives into a fine powder, but how 'good enough' is it? If it's not good enough, is there an alternative that leaves the hardware intact that is functionally good enough, assuming that incredibly powerful people don't want my data, who'd just break out the pliers and get it anyway.
Extra points that I'm interested in, but are tangentially related to the question so aren't required for an answer is; what other issues am I likely to run into if I were to give/sell these computers on? (My organisation owns the computers and the licences for Windows, and would like to offer them to employees once we're done with them). I believe there's an issue with transferring the Windows licence, for example.
windows hard-drive security wipe
windows hard-drive security wipe
edited 15 mins ago
Bergi
1481110
1481110
asked 19 hours ago
Yann
162110
162110
3
After re installation overwrite all free space then you are good to go....howtogeek.com/137108/â¦
â Moab
19 hours ago
3
You do understand you can just Reset Windows 10, choose to keep nothing, and and you will get the results you want? If these are Enterprise editions, it will be more difficult, for the new owners since they wonâÂÂt be able to activate them due to loss of the KMS. Volume licenses must communicate with the KMS once every 180 days.
â Ramhound
19 hours ago
1
Once old data is overwritten by re installation and free space overwrite, nothing can be recovered.
â Moab
19 hours ago
@Moab That sounds like an answer to me, pulling the contents of that article into one would get my upvote :)
â Yann
19 hours ago
2
@Yann - So instead just install Windows with the generic key, and leave it to the new owner, to change the license key. I personally would, encrypt the data with BitLocker, then just format the HDD and reinstall an unlicensed installation of Windows. This makes data recovery impossible and the burden of getting a license somebodyâÂÂs else problem
â Ramhound
19 hours ago
 |Â
show 5 more comments
3
After re installation overwrite all free space then you are good to go....howtogeek.com/137108/â¦
â Moab
19 hours ago
3
You do understand you can just Reset Windows 10, choose to keep nothing, and and you will get the results you want? If these are Enterprise editions, it will be more difficult, for the new owners since they wonâÂÂt be able to activate them due to loss of the KMS. Volume licenses must communicate with the KMS once every 180 days.
â Ramhound
19 hours ago
1
Once old data is overwritten by re installation and free space overwrite, nothing can be recovered.
â Moab
19 hours ago
@Moab That sounds like an answer to me, pulling the contents of that article into one would get my upvote :)
â Yann
19 hours ago
2
@Yann - So instead just install Windows with the generic key, and leave it to the new owner, to change the license key. I personally would, encrypt the data with BitLocker, then just format the HDD and reinstall an unlicensed installation of Windows. This makes data recovery impossible and the burden of getting a license somebodyâÂÂs else problem
â Ramhound
19 hours ago
3
3
After re installation overwrite all free space then you are good to go....howtogeek.com/137108/â¦
â Moab
19 hours ago
After re installation overwrite all free space then you are good to go....howtogeek.com/137108/â¦
â Moab
19 hours ago
3
3
You do understand you can just Reset Windows 10, choose to keep nothing, and and you will get the results you want? If these are Enterprise editions, it will be more difficult, for the new owners since they wonâÂÂt be able to activate them due to loss of the KMS. Volume licenses must communicate with the KMS once every 180 days.
â Ramhound
19 hours ago
You do understand you can just Reset Windows 10, choose to keep nothing, and and you will get the results you want? If these are Enterprise editions, it will be more difficult, for the new owners since they wonâÂÂt be able to activate them due to loss of the KMS. Volume licenses must communicate with the KMS once every 180 days.
â Ramhound
19 hours ago
1
1
Once old data is overwritten by re installation and free space overwrite, nothing can be recovered.
â Moab
19 hours ago
Once old data is overwritten by re installation and free space overwrite, nothing can be recovered.
â Moab
19 hours ago
@Moab That sounds like an answer to me, pulling the contents of that article into one would get my upvote :)
â Yann
19 hours ago
@Moab That sounds like an answer to me, pulling the contents of that article into one would get my upvote :)
â Yann
19 hours ago
2
2
@Yann - So instead just install Windows with the generic key, and leave it to the new owner, to change the license key. I personally would, encrypt the data with BitLocker, then just format the HDD and reinstall an unlicensed installation of Windows. This makes data recovery impossible and the burden of getting a license somebodyâÂÂs else problem
â Ramhound
19 hours ago
@Yann - So instead just install Windows with the generic key, and leave it to the new owner, to change the license key. I personally would, encrypt the data with BitLocker, then just format the HDD and reinstall an unlicensed installation of Windows. This makes data recovery impossible and the burden of getting a license somebodyâÂÂs else problem
â Ramhound
19 hours ago
 |Â
show 5 more comments
4 Answers
4
active
oldest
votes
up vote
11
down vote
Create a DBAN USB or CD and wipe the drive. This utility is designed to wipe a hard drive by overwriting it. DBAN only works on hard disk drives (HDD), not solid state drives (SSD).
You do not need to do a multipass wipe. A single pass is all you need to prevent others from reading your drive. The 7 pass wipe is a myth that still persists to this day.
Reinstalling Windows can overwrite some, none, or all of the data. Creating a simple DBAN boot disk and using it mitigates all the risk.
As for the Windows licenses, if the license came bundled with the computer, or were bought individually, they can be given to someone else. You can always call Microsoft to confirm the validity of selling a license.
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
1
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
1
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
 |Â
show 1 more comment
up vote
6
down vote
After Windows format and clean re installation of the OS overwrite all free space using the cypher command using the command prompt.
cipher /w:F
F would be the drive letter of the system volume which is usually C
Nothing can be recovered now, by anyone.
add a comment |Â
up vote
2
down vote
To answer your initial question first; you are not safe by just reinstalling Windows, since you cannot guarantee that the data in question will be overwritten.
You may want to overwrite the (deleted) sensitive data using one of some available options;
You can use the DiskPart command - Clean All - but make sure that you know what disk you are working with.
You can (after deleting the sensitive data) use the Cipher command with the /W
option.
You can also make yourself a simple BAT file or two - a couple of samples below;
One additional comment: If you wipe the disk/data 2-3 times, thereby alter the magnetic patterns beyond recognition, then even 'incredibly powerful people' will not be able to recover the data.
---
@echo off
rem Simple Disk Wipe Utility - wipedfast.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Grow file system test (fast / large increments - less secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_a.tmp
del wash_b.tmp
copy wash_c.tmp wash_a.tmp
ren wash_c.tmp wash_b.tmp
goto start
---
@echo off
rem Simple Disk Wipe Utility - wiped.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Wipe file system (slow / small increments - most secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files.
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_b.tmp
ren wash_c.tmp wash_b.tmp
goto start
New contributor
add a comment |Â
up vote
0
down vote
Simply wiping the data (and overwriting it with random junk/zeroes) and installing a new windows is probably safe enough for you. At that point, any recovery of the old data will require the disk to be a HDD, physical access to the disk, really specialized forensic levels of knowledge, and important people caring a great deal about it.
If that's not safe enough, you need the fine powder method. I'd say it probably isn't, since we're talking cold war state secret levels of security.
If it's that important to you, you probably wouldn't post this question that'll save you a couple hundred bucks, because the security of this level doesn't care about money.
New contributor
add a comment |Â
4 Answers
4
active
oldest
votes
4 Answers
4
active
oldest
votes
active
oldest
votes
active
oldest
votes
up vote
11
down vote
Create a DBAN USB or CD and wipe the drive. This utility is designed to wipe a hard drive by overwriting it. DBAN only works on hard disk drives (HDD), not solid state drives (SSD).
You do not need to do a multipass wipe. A single pass is all you need to prevent others from reading your drive. The 7 pass wipe is a myth that still persists to this day.
Reinstalling Windows can overwrite some, none, or all of the data. Creating a simple DBAN boot disk and using it mitigates all the risk.
As for the Windows licenses, if the license came bundled with the computer, or were bought individually, they can be given to someone else. You can always call Microsoft to confirm the validity of selling a license.
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
1
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
1
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
 |Â
show 1 more comment
up vote
11
down vote
Create a DBAN USB or CD and wipe the drive. This utility is designed to wipe a hard drive by overwriting it. DBAN only works on hard disk drives (HDD), not solid state drives (SSD).
You do not need to do a multipass wipe. A single pass is all you need to prevent others from reading your drive. The 7 pass wipe is a myth that still persists to this day.
Reinstalling Windows can overwrite some, none, or all of the data. Creating a simple DBAN boot disk and using it mitigates all the risk.
As for the Windows licenses, if the license came bundled with the computer, or were bought individually, they can be given to someone else. You can always call Microsoft to confirm the validity of selling a license.
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
1
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
1
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
 |Â
show 1 more comment
up vote
11
down vote
up vote
11
down vote
Create a DBAN USB or CD and wipe the drive. This utility is designed to wipe a hard drive by overwriting it. DBAN only works on hard disk drives (HDD), not solid state drives (SSD).
You do not need to do a multipass wipe. A single pass is all you need to prevent others from reading your drive. The 7 pass wipe is a myth that still persists to this day.
Reinstalling Windows can overwrite some, none, or all of the data. Creating a simple DBAN boot disk and using it mitigates all the risk.
As for the Windows licenses, if the license came bundled with the computer, or were bought individually, they can be given to someone else. You can always call Microsoft to confirm the validity of selling a license.
Create a DBAN USB or CD and wipe the drive. This utility is designed to wipe a hard drive by overwriting it. DBAN only works on hard disk drives (HDD), not solid state drives (SSD).
You do not need to do a multipass wipe. A single pass is all you need to prevent others from reading your drive. The 7 pass wipe is a myth that still persists to this day.
Reinstalling Windows can overwrite some, none, or all of the data. Creating a simple DBAN boot disk and using it mitigates all the risk.
As for the Windows licenses, if the license came bundled with the computer, or were bought individually, they can be given to someone else. You can always call Microsoft to confirm the validity of selling a license.
edited 16 hours ago
answered 18 hours ago
Keltari
46.3k16107156
46.3k16107156
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
1
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
1
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
 |Â
show 1 more comment
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
1
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
1
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
The 7 pass may have been true, but in any case it would take an oscilloscope to read past the first one. Basically, it was a defense against a state-level power that essentially nobody needed ever. I don't think it's true of modern hardware.
â Joshua
10 hours ago
1
1
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
The DBAN link is dead as far as I can tell, and I'm not sure it's maintained at all. There's a fork at github and it seems to be still on sourceforge. I'd prefer other methods myself.
â StephenG
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@StephenG DBAN link is working just fine... I actually just updated my USB key with DBAN on it.
â Keltari
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
@Joshua Ancient hard drives, up to about the early 1990s, needed multiple ovewrite passes for this reason. But it hasn't been necessary for decades.
â Michael Hampton
4 hours ago
1
1
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
I'm getting a 504 error on dban.org everytime. Note that Wikipedia says DBAN is no longer worked on.
â StephenG
2 hours ago
 |Â
show 1 more comment
up vote
6
down vote
After Windows format and clean re installation of the OS overwrite all free space using the cypher command using the command prompt.
cipher /w:F
F would be the drive letter of the system volume which is usually C
Nothing can be recovered now, by anyone.
add a comment |Â
up vote
6
down vote
After Windows format and clean re installation of the OS overwrite all free space using the cypher command using the command prompt.
cipher /w:F
F would be the drive letter of the system volume which is usually C
Nothing can be recovered now, by anyone.
add a comment |Â
up vote
6
down vote
up vote
6
down vote
After Windows format and clean re installation of the OS overwrite all free space using the cypher command using the command prompt.
cipher /w:F
F would be the drive letter of the system volume which is usually C
Nothing can be recovered now, by anyone.
After Windows format and clean re installation of the OS overwrite all free space using the cypher command using the command prompt.
cipher /w:F
F would be the drive letter of the system volume which is usually C
Nothing can be recovered now, by anyone.
answered 17 hours ago
Moab
50.6k1393157
50.6k1393157
add a comment |Â
add a comment |Â
up vote
2
down vote
To answer your initial question first; you are not safe by just reinstalling Windows, since you cannot guarantee that the data in question will be overwritten.
You may want to overwrite the (deleted) sensitive data using one of some available options;
You can use the DiskPart command - Clean All - but make sure that you know what disk you are working with.
You can (after deleting the sensitive data) use the Cipher command with the /W
option.
You can also make yourself a simple BAT file or two - a couple of samples below;
One additional comment: If you wipe the disk/data 2-3 times, thereby alter the magnetic patterns beyond recognition, then even 'incredibly powerful people' will not be able to recover the data.
---
@echo off
rem Simple Disk Wipe Utility - wipedfast.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Grow file system test (fast / large increments - less secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_a.tmp
del wash_b.tmp
copy wash_c.tmp wash_a.tmp
ren wash_c.tmp wash_b.tmp
goto start
---
@echo off
rem Simple Disk Wipe Utility - wiped.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Wipe file system (slow / small increments - most secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files.
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_b.tmp
ren wash_c.tmp wash_b.tmp
goto start
New contributor
add a comment |Â
up vote
2
down vote
To answer your initial question first; you are not safe by just reinstalling Windows, since you cannot guarantee that the data in question will be overwritten.
You may want to overwrite the (deleted) sensitive data using one of some available options;
You can use the DiskPart command - Clean All - but make sure that you know what disk you are working with.
You can (after deleting the sensitive data) use the Cipher command with the /W
option.
You can also make yourself a simple BAT file or two - a couple of samples below;
One additional comment: If you wipe the disk/data 2-3 times, thereby alter the magnetic patterns beyond recognition, then even 'incredibly powerful people' will not be able to recover the data.
---
@echo off
rem Simple Disk Wipe Utility - wipedfast.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Grow file system test (fast / large increments - less secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_a.tmp
del wash_b.tmp
copy wash_c.tmp wash_a.tmp
ren wash_c.tmp wash_b.tmp
goto start
---
@echo off
rem Simple Disk Wipe Utility - wiped.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Wipe file system (slow / small increments - most secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files.
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_b.tmp
ren wash_c.tmp wash_b.tmp
goto start
New contributor
add a comment |Â
up vote
2
down vote
up vote
2
down vote
To answer your initial question first; you are not safe by just reinstalling Windows, since you cannot guarantee that the data in question will be overwritten.
You may want to overwrite the (deleted) sensitive data using one of some available options;
You can use the DiskPart command - Clean All - but make sure that you know what disk you are working with.
You can (after deleting the sensitive data) use the Cipher command with the /W
option.
You can also make yourself a simple BAT file or two - a couple of samples below;
One additional comment: If you wipe the disk/data 2-3 times, thereby alter the magnetic patterns beyond recognition, then even 'incredibly powerful people' will not be able to recover the data.
---
@echo off
rem Simple Disk Wipe Utility - wipedfast.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Grow file system test (fast / large increments - less secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_a.tmp
del wash_b.tmp
copy wash_c.tmp wash_a.tmp
ren wash_c.tmp wash_b.tmp
goto start
---
@echo off
rem Simple Disk Wipe Utility - wiped.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Wipe file system (slow / small increments - most secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files.
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_b.tmp
ren wash_c.tmp wash_b.tmp
goto start
New contributor
To answer your initial question first; you are not safe by just reinstalling Windows, since you cannot guarantee that the data in question will be overwritten.
You may want to overwrite the (deleted) sensitive data using one of some available options;
You can use the DiskPart command - Clean All - but make sure that you know what disk you are working with.
You can (after deleting the sensitive data) use the Cipher command with the /W
option.
You can also make yourself a simple BAT file or two - a couple of samples below;
One additional comment: If you wipe the disk/data 2-3 times, thereby alter the magnetic patterns beyond recognition, then even 'incredibly powerful people' will not be able to recover the data.
---
@echo off
rem Simple Disk Wipe Utility - wipedfast.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Grow file system test (fast / large increments - less secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_a.tmp
del wash_b.tmp
copy wash_c.tmp wash_a.tmp
ren wash_c.tmp wash_b.tmp
goto start
---
@echo off
rem Simple Disk Wipe Utility - wiped.bat
rem ---
rem --- 1) Delete all unwanted content from disk, leaving possibly only the command interpreter to run this script.
rem --- 2) Delete content from trashcan/recycled, if any.
rem --- 3) Run this script until it reports file system full.
rem --- 4) Delete WASH*.TMP files on each drive to reclaim space or to rerun utility.
rem --- Do this for all file systems/drives (C:, D:) on system, at least a couple of times.
rem ---
echo Wipe file system (slow / small increments - most secure). See comments in script file.
echo To be done for each drive (C:, D:) on system.
echo Abort with Ctrl-C when disk full and delete WASH-files.
echo - Ideally run wipedfast.bat first - then wiped.bat when disk full - before deleting WASH-files.
pause
echo abcdefghijklmnopqrstuvwxyz0987654321ABCDEFGHIJKLMNOPQRSTUVWXYZ > wash_a.tmp
copy wash_a.tmp wash_b.tmp
:start
copy wash_a.tmp+wash_b.tmp wash_c.tmp
del wash_b.tmp
ren wash_c.tmp wash_b.tmp
goto start
New contributor
edited 5 hours ago
Peter Mortensen
8,227166184
8,227166184
New contributor
answered 17 hours ago
reben
312
312
New contributor
New contributor
add a comment |Â
add a comment |Â
up vote
0
down vote
Simply wiping the data (and overwriting it with random junk/zeroes) and installing a new windows is probably safe enough for you. At that point, any recovery of the old data will require the disk to be a HDD, physical access to the disk, really specialized forensic levels of knowledge, and important people caring a great deal about it.
If that's not safe enough, you need the fine powder method. I'd say it probably isn't, since we're talking cold war state secret levels of security.
If it's that important to you, you probably wouldn't post this question that'll save you a couple hundred bucks, because the security of this level doesn't care about money.
New contributor
add a comment |Â
up vote
0
down vote
Simply wiping the data (and overwriting it with random junk/zeroes) and installing a new windows is probably safe enough for you. At that point, any recovery of the old data will require the disk to be a HDD, physical access to the disk, really specialized forensic levels of knowledge, and important people caring a great deal about it.
If that's not safe enough, you need the fine powder method. I'd say it probably isn't, since we're talking cold war state secret levels of security.
If it's that important to you, you probably wouldn't post this question that'll save you a couple hundred bucks, because the security of this level doesn't care about money.
New contributor
add a comment |Â
up vote
0
down vote
up vote
0
down vote
Simply wiping the data (and overwriting it with random junk/zeroes) and installing a new windows is probably safe enough for you. At that point, any recovery of the old data will require the disk to be a HDD, physical access to the disk, really specialized forensic levels of knowledge, and important people caring a great deal about it.
If that's not safe enough, you need the fine powder method. I'd say it probably isn't, since we're talking cold war state secret levels of security.
If it's that important to you, you probably wouldn't post this question that'll save you a couple hundred bucks, because the security of this level doesn't care about money.
New contributor
Simply wiping the data (and overwriting it with random junk/zeroes) and installing a new windows is probably safe enough for you. At that point, any recovery of the old data will require the disk to be a HDD, physical access to the disk, really specialized forensic levels of knowledge, and important people caring a great deal about it.
If that's not safe enough, you need the fine powder method. I'd say it probably isn't, since we're talking cold war state secret levels of security.
If it's that important to you, you probably wouldn't post this question that'll save you a couple hundred bucks, because the security of this level doesn't care about money.
New contributor
New contributor
answered 3 hours ago
Gloweye
1
1
New contributor
New contributor
add a comment |Â
add a comment |Â
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fsuperuser.com%2fquestions%2f1360332%2fhow-safely-does-reinstalling-windows-wipe-old-data%23new-answer', 'question_page');
);
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Sign up or log in
StackExchange.ready(function ()
StackExchange.helpers.onClickDraftSave('#login-link');
);
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
3
After re installation overwrite all free space then you are good to go....howtogeek.com/137108/â¦
â Moab
19 hours ago
3
You do understand you can just Reset Windows 10, choose to keep nothing, and and you will get the results you want? If these are Enterprise editions, it will be more difficult, for the new owners since they wonâÂÂt be able to activate them due to loss of the KMS. Volume licenses must communicate with the KMS once every 180 days.
â Ramhound
19 hours ago
1
Once old data is overwritten by re installation and free space overwrite, nothing can be recovered.
â Moab
19 hours ago
@Moab That sounds like an answer to me, pulling the contents of that article into one would get my upvote :)
â Yann
19 hours ago
2
@Yann - So instead just install Windows with the generic key, and leave it to the new owner, to change the license key. I personally would, encrypt the data with BitLocker, then just format the HDD and reinstall an unlicensed installation of Windows. This makes data recovery impossible and the burden of getting a license somebodyâÂÂs else problem
â Ramhound
19 hours ago