Skip to main content

Cornell University

Disk and File Erasure

Options for erasing disks and wiping files.

This article applies to: Security Essentials for IT Professionals

Software

The following utilities meet industry best practices for data sanitization on common read/write media including:

  • Hard disks
  • Floppy disks
  • USB drives
UtilityDiskFilePC/WinMacOther
DBAN
How to use DBAN
YNYYFloppy or CD bootable x86 system
EraserYYYNN
SdeleteYYYNN
Disk Utility (OSX native)YYNYN
Wipe/Shred (Linux native)YYNNCommon Linux distributions
Dd/dcflddYYNNUNIX utility

File Erasure Features in Applications

The following features included in application software meet industry best practices for data sanitization in individual files.

ApplicationFeaturePC/WinMacOther
Identity FinderShredYYN
Spider3EraseYNN
Spider 2008Secure EraseYNN

Hardware

  • For Drives That Will Be Reused:
    Wiebetech Drive eraser: Able to rapidly erase PATA/SATA hard drives using either multi-pass overwrite or the ATA-6 secure erase command. This device is for small to medium volume sanitization of operational drives.
  • For Drives That Will Not Be Reused: Where drive use is not possible or not desirable, magnetic media should be degaussed or mechanically shredded.  The no-fee campus R5 service will pick up your drives and securely dispose of them. 

Note about solid state devices: USB thumb drives, compact flash, MMC/SD, and the like are unreliable in the face of disk wiping protocols. Multi-pass wiping is not technically relevant for solid-state devices. More importantly, solid-state storage has a very limited number of read/write cycles and is designed with considerable surplus. This surplus storage is used to relocate data away from failing data segments. Wipe utilities cannot guarantee that all originally allocated blocks have been wiped. Further, they cannot insure new data is properly committed to the device. If disposal is the ultimate goal, physical destruction is strongly recommended.

 

Comments?

To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.