Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations SkipVought on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Can data be wiped if hardware stolen

Status
Not open for further replies.

joepalm

Technical User
May 28, 2001
294
0
0
NZ
I am looking for a way if my Laptop or Desktop computer got stolen somehow data can be deleted or formatted after a time span. Does anyone know if this is possible?

Thanks
 
A PC hardware definetely does NOT support this kind of function.

However ...

I'm sure you can find someone that can build you a small DOS or WINDOWS application for you .... that would run in each boot and ask you for a password or some other ID confirmation (if you don't enter the right code 5 times then it should perform a Format of the HDD)

Hope that helped. Michael Manos
Automation R&D
 
Or setup the PC so that if it is started up without a boot disk it does a government class wipe on the drive. Just hope the floppy doesn't fail ;p

I'm sure it could be done.
 
tvale,
If the info you are talking about is so sensitive then it should be secured with encryption on your machines, or archived off and stored in a safe. There are a number of straightforward ways to secure data.

If the hypothetical thief is just after the hardware - the chances of them being remotely interested in your machine's data is slim to none.

If the data is so sensitive that you fear corporate malpractice, any such organisation stooping so low would have the means to circumvent any "security" you installed.

However, if the data is incriminating in some way that would prevent you from reporting the items as stolen for fear of the data being interrogated, then...

Finally, achieving an effective solution for what you want is neither free nor without risk. I would suggest you speak with a local IT agency with regards to this problem - Unfortunately, there are very few cheap ways to get top class security.

If the data is more valuable than the equipment then you need to spend at least as much on its security as you did on the equipment - I stand to be corrected on that point ;-)

Regards. It not what you say but how you say it that counts...apparently.
 
I agree that your best course of action is probably to save any sensitive data to a removable media and then secure the media itself. Of course, make sure that you have a good backup as well ;-)

Bottom line? When you figure it out, maybe you should clue in the FBI LOL

(just one of many US gov examples) Mudskipper
___________________________________________________________________________________

Groucho said it best- "A four year-old child could understand this! Quick! Run out and find me a four year-old child: I can't make heads nor tails out of this!"
 
In the same alley, but a little different:

Is there any way to make a hard-drive machine dependent, so that if the hard drive is stolen and put into another machine the data could not be accessed?

fnl
 
effennel
This is essentially what microsoft has done with xp.
They have tied parts of the machine into the algorithm
with the key so that if you change more than a couple things with the machine you need to reregister.
With a same type program you could have it deny access to the drive.
 
Bobg1,

What if this stolen drive is installed as non-boot drive. Then I boot up my machine and I could still copy the data from that drive. no?

fnl
 
You should be using data encryption to start with if the data is that sensative and has a chance of being stolen.
 
Do you mean to encrypt the whole hard drive?
How would you do that without affecting performances?

fnl
 
effennel:
You wouldn't. But that's the price you pay for security. You would not have to encrypt the whole drive, just the data.
 
Are there applications that could encrypt/desencrypt a serie of specified files and folders on command?
 
There is all sorts of encryption tools avaiable, just go google "data encryption" Some of the best will not allow you to do anything without a hardware key, others only require a software key.
 
why not get a cheap hard drive caddy and put your sensitive data on the secondary drive that can be removed, and keep your OS and everthing else on the primary, then you could encrypt your secondary drive without affecting the performance of your machine.
 
How about decrypting the data to and running it from a ramdrive? On shutdown you encode it back to the hard drive.

Ed Fair
Any advice I give is my best judgement based on my interpretation of the facts you supply. Help increase my knowledge by providing some feedback, good or bad, on any advice I have given.
 
of course, there are government and other sources that can, for a price, read the data off the disk no matter how many times you write over it...

So! either (a) don't commit super-sensitive data to machines that can be stolen or impounded - or - (b) encrypt all sensitive data onto separate data drives, using the most secure encryption routines you can afford...

Neither is perfect; but if you have secrets, they have a value in respect to time...

If you want to prevent, say, your secret terrorist plans from being captured by the CIA, you might as well forget it... If you want to prevent your porn from getting you incarcerated, ditto... The government of most countries have ways to make your computer sing like Loretta Lynn...

OTOH, if you want to prevent "ABC Corporation" from reading your secret formula for making cheaper left-handed grotomizying hydrostators or some other high-tech widget, you can feel relatively safe because your competition doesn't have the time, money, or expertise to decrypt--it would be easier to reverse-engineer one...

Good luck!!

Setnaffa is an MCP-W2K (working on W2K) with a few other certs, too...
 
setnaffa, I don't believe that is actually true.

I'd be damn impressed if anybody got anything off a hard drive that has had random 1's and 0's writting across it 10 times ;)
 
senaffa is right - writing random 0s and 1s does not secure a disk.

Think of a 0 having a magnetisation of 0 and a 1 having a magnetisation of 100.

When you write a 0 back over the 1 the magnetisation does not get returned to 0 but something like 2 or 3. The exact value may depend on how long that spot on the disk surface was a 1. There are various reasons for this such as getting the erase current right and getting the read/write heads exactly aligned.

A commercial disk controller will take a magnetisation value of 3 and round it down to zero so that you read a zero rather than a one. If it sees something like 20 it tries to reread regarding the bad value as a bad sector.

However, a government can create its own controller to look at the actual magnetisation values. It can also look at sectors marked as bad because they have data stored at a non-standard value.

Writing random 0s and 1s is possibly ok for standard commercial needs but the only way to be really sure is to dissolve the disk in acid.

Sleep easily at night.
 
Thanks for the info, much enlightenment :)

But assuming the Hard Drive has been actively used, with 1's and 0's being written for general use, and then it is wiped, wouldn't the results of a government investigation show up mere gibberish ?
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top