*****************************************************************
Message delivered directly to members of the group:
publish-the...@googlegroups.com*****************************************************************
Please consider this free-reprint article written by:
Sam Miller
*****************************
IMPORTANT - Publication/Reprint Terms
- You have permission to publish this article electronically in free-only publications such as a website or an ezine as long as the bylines are included.
- You are not allowed to use this article for commercial purposes. The article should only be reprinted in a publicly accessible website and not in a members-only commercial site.
- You are not allowed to post/reprint this article in any sites/publications that contains or supports hate, violence, porn and warez or any indecent and illegal sites/publications.
- You are not allowed to use this article in UCE (Unsolicited Commercial Email) or SPAM. This article MUST be distributed in an opt-in email list only.
- If you distribute this article in an ezine or newsletter, we ask that you send a copy of the newsletter or ezine that contains the article to
http://www.isnare.com/eta.php?aid=202718
- If you post this article in a website/forum/blog, ALL links MUST be set to hyperlinks and we ask that you send a copy of the URL where the article is posted to
http://www.isnare.com/eta.php?aid=202718
- We request that you ask permission from the author if you want to publish this article in print.
The role of iSnare.com is only to distribute this article as part of its Article Distribution feature (
http://www.isnare.com/distribution.php ). iSnare.com does NOT own this article, please respect the author's copyright and this publication/reprint terms. If you do not agree to any of these terms, please do not reprint or publish this article.
*****************************
Article Title: Eliminate Unnecessary Files Forever - Use File Shredder
Author: Sam Miller
Word Count: 547
Article URL:
http://www.isnare.com/?aid=202718&ca=Computers+and+Technology
Format: 64cpl
Contact The Author:
http://www.isnare.com/eta.php?aid=202718
Easy Publish Tool:
http://www.isnare.com/html.php?aid=202718
*********************** ARTICLE START ***********************
The basic intent of a file shredder is to entirely obliterate the file. However, advanced software's does the dual task of not only destroying a file but also shreds the evidence that the file was deleted.
A file shredder works by overwriting the file, mostly once and if needed up to three times. The program then removes the file from the directory area by again overwriting it. Running a defragmentation after file shredding can render the file impossible to recover. Running a file shredder is imperative for anyone who is considering selling or donating their old comp. These are a potential treasure house of personal information that can be used to wreck havoc on pre users. Recent studies have shown a rise in the disturbing trend of misusing personal information and files on donated comps even after files were deleted.
People often assume that by deleting a file from their hard drive the file is forever lost. Actually the file is very much there on their hard drive. When a file is moved into the recycle bin, the file stays in its place. But the directory entry of the file, i.e., the complete path and filename of a file is moved into a hidden folder. The file is then renamed; the original name of the file is stored in a hidden index file called INFO2. If at any point the file is clicked to be restored, windows read the original path from the INFO file and rename the file into the directory. So what happens when you delete the file from the recycle bin? Again the data is not deleted, instead windows simply marks the place occupied by the file as not needed and available fro use. The data will be there until the time the system needs the space for another file, when it will be overwritten. This dramatically increases your chance of recovering a deleted file if you haven't done any subsequent disk activity such as creating, copying and editing.
A techie who knows his job can easily recover deleted data from a hard drive within minutes. Even after it has been overwritten once, the information underneath the top layer can be scrapped up by using sophisticated equipments.
Trade espionages stalk the cyber world looking for tit bits of trade secrets that can knock you out of business within in days. File shredding forms one of the core entities in the complex labyrinth of security programs. There are basically three ways to decimate a sensitive file. One would be to use a file shredding software, next is using a powerful encryption and lastly a bit on the extreme side is incinerating media or pouring acid on it. Of the three the file shredder is the most practical for an average user and largely sufficient. The newer files shredding programs comes augmented with features such as wipe free space and wipe file names. Wipe file names allows you to overwrite the file names. After file wiping, simple recovery programs will not even show the file. The sophisticated ones show the name of the file, but it will be scrambled beyond recognition. Free disk space wiping is a powerful feature which renders it impossible to recover deleted files.
About The Author: If you are interested in file shredder, check this web-site to learn more about file wiping.
http://www.shredagent.com/
Please use the HTML version of this article at:
http://www.isnare.com/html.php?aid=202718
*********************** ARTICLE END ***********************
- To distribute your articles go to
http://www.isnare.com/distribution.php
- For more free-reprint articles go to
http://www.isnare.com