Does reformatting always work?

  • Thread starter Thread starter BUB 209
  • Start date Start date
B

BUB 209

......or are there circumstances where the hard drive is forever trashed? Can
the cmos chip get infected? Somebody told me there's a vast underground
salt deposit where virus- ridden computers are stored. (the latter a joke of
course, the rest not. Ha, ha.)
 
BUB 209 said:
Does reformatting always work?

For malware removal? ~ No, not always. Format doesn't cover all
of the places on disk that malware can hide. Malicious boot code
for example won't be erased or overwritten by mere formatting.
.....or are there circumstances where the hard drive is forever trashed?

For the most part, malicious software doesn't physically damage hardware.
....but sometimes it is not cost effective to reprogram firmware.
Can the cmos chip get infected?

The CMOS chip? ~ no, chips can't be infected. Malware can write
to the CMOS data area (or erase it I suppose), but the data stored
there is not code to be executed, it is data.

Do you mean the BIOS firmware? I haven't heard of any replicative
malware successfully using this code storage area as a place to hide.
However, several have used it as a damaging payload target.
Somebody told me there's a vast underground
salt deposit where virus- ridden computers are stored.

That is where I found most of the machines I am using today.
(those, and the ones possessed by demons, are all buried there)
(the latter a joke of
course, the rest not. Ha, ha.)

I was kidding too (except about the demonic possessions)
 
.....or are there circumstances where the hard drive is forever trashed?

Shimomura, the guy who supposedly caught Kevin Mitnick, supposedly had
some malware that would trash a hard drive. Most people are doubtful,
and I've never heard of anyone demonstrating this ability. Supposedly
it is theoretically possible to cause a monitor's horizontal scan rate
to exceed the recommended rate and cause damage to a monitor, but I
don't know of any virus that tries that.
Can the cmos chip get infected?

No. There are viruses that can use your motherboard's ability to
"flash" your BIOS, which is a showstopper until you get it replaced
(hopefully it is socketed, not soldered in).
 
After you reformated your HD have a copy of killdisc on a floppy run it two
times it is about the best as info cannot be retrieved after killldisc has
been used as it uses DOD 5220.22-M standard! which destroys and rewrites
over the disc multiple times even the goverment cannot retrieve data after
it has been used?
 
Duh! said:
After you reformated your HD have a copy of killdisc on a floppy run it two
times it is about the best as info cannot be retrieved after killldisc has
been used as it uses DOD 5220.22-M standard! which destroys and rewrites
over the disc multiple times even the goverment cannot retrieve data after
it has been used?

you should go back and re-read that standard... media that contains top
secret data has to be physically destroyed... secure
deletion/overwriting is not sufficient because the data *can* still be
retrieved (though at great expense)...
 
kurt wismer said:
you should go back and re-read that standard... media that contains top
secret data has to be physically destroyed... secure
deletion/overwriting is not sufficient because the data *can* still be
retrieved (though at great expense)...

True. Although multiple pass overwrites will usually make the
data irretrievable, due to tracking errors the original data's
edges *might* still be seen. This *might* is too much of a
risk for "Top Secret" data.
 
DoD means department of defence the US DoD.. they use it!
<snip>
If you use FDISK, FORMAT utilities, or DELETE standard operating system
command for data removal, there is always a chance to recover deleted data
(data recovery software) and use against the owner's will. We highly
recommend you to run this FREE utility for the hard and floppy drives you
want to dispose of, recycle, re-use, sell or donate to somebody.

Active@ KillDisk conforms to US Department of Defense clearing and
sanitizing standard DoD 5220.22-M. The most secure Gutmann's data
destruction method is also implemented. You can be sure that once you clean
up with Active@ KillDisk, sensitive information is purged out forever.

This is security software for unrecoverable data elimination for any
computer capable of booting in DOS mode from floppy drive. It uses access to
the drive's data on a physical level via BIOS bypassing logical drive
structure organization, thus it does not matter what operating systems and
file systems located on the machine. </snip>
 
Duh! said:
DoD means department of defence the US DoD.. they use it!

we know what dod means...

i direct your attention to http://www.dss.mil/isec/nispom_0195.htm

specifically the clearing and sanitization matrix in chapter 8, section
306... this is the same matix you'll see on any site claiming their
software meets the DoD 5220.22M standard... the options for sanitizing
magnetic disks (in the cases where there are options) are degaussing
with approved type 1 or type 2 degaussing equipment, overwriting (for
media that does not contain top secret information), or physical
destruction of the media... (note that for floppy disks or bernoulli
disks physical destruction is the only option)

overwriting makes software based data recovery impossible, but it does
not make hardware based data recovery impossible...
 
Duh! said:
DoD means department of defence the US DoD..

I know, in fact I have worked for them.
...they use it!

They use the standard (but it is now more than a triple pass random
overwrite being used IIRC).

d. Overwrite all addressable locations with a character, its complement, then a
random character and verify. THIS METHOD IS NOT APPROVED FOR
SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION.

....ever wonder why that is?

m. Destroy - Disintegrate, incinerate, pulverize, shred, or melt.

....and why this is the *only* suitable method?

Their words, not mine.

From:

http://www.killdisk.com/dod.htm
 
Back
Top