home by any means necessary stage play jennifer minary e 89 st

strongest talent spec for death knight

March 7, 2011 by Andrew Block

Secure Deletion of Data from Magnetic and Solid-State Memory - Wipe
Secure Deletion of Data from Magnetic and Solid-State Memory . For example most of the current guidelines on sanitizing magnetic media predate the .
http://wipe.sourceforge.net/secure_del.html

Secure deletion of data from magnetic and solid-state memory
[9] "Computation of Magnetic Fields in Hysteretic Media", Amr Adly, Isaak . Sung Y. Shin, Secure deletion for NAND flash file system, Proceedings of the 2008 .
http://dl.acm.org/citation.cfm?id=1267577

Data remanence - Wikipedia, the free encyclopedia
Applied to magnetic media, degaussing may purge an entire media element quickly and . Secure Deletion of Data from Magnetic and Solid-State Memory.
http://en.wikipedia.org/wiki/Data_remanence

Steps to remove Symantec Endpoint Protection 11 WITHOUT knowing the uninstall password:

  1. Click on Start -> Run (or Window Key + R if you don’t have the Run menu item)
  2. Ubuntu Manpage: wipe - securely erase files from magnetic media
    Recovery of supposedly erased data from magnetic media is easier than what . No secure deletion program that does filesystem-level calls can sanitize files on .
    http://manpages.ubuntu.com/manpages/lucid/man1/wipe.1.html

  3. Secure data disposal methods - Information Technology - Miller ...
    The main division is between "magnetic media" and "optical media. . Most " secure file deletion" software offers a choice of more and less secure over-writing .
    http://it.med.miami.edu/x677.xml

  4. Wipe, A UNIX tool for secure deletion
    wipe is a little command for securely erasing files from magnetic media. It compiles under various unix platforms, including Linux 2. * , (Open, Net, Free) BSD, aix .
    http://lambda-diode.com/software/wipe/

  5. Adding Secure Deletion to Your Favorite File System
    Adding Secure Deletion to Your Favorite File System. Nikolai Joukov and Erez . Magnetic media can be degaussed; more gener- ally the storage media can be .
    http://www.fsl.cs.sunysb.edu/docs/purgefs/purgefs.pdf

    :)

InfoSec - FAQ
. secure data deletion for magnetic media such as hard disks, .
http://www.infosec.gov.hk/textonly/english/faq/faq_disposal.html

Tools to delete files securely in ubuntu Linux | Ubuntu Geek
Jan 5, 2009 . wipe is a little command for securely erasing files from magnetic media. It compiles under various unix platforms, including Linux 2.
http://www.ubuntugeek.com/tools-to-delete-files-securely-in-ubuntu-linux.html

You may also like:

  1. 1 64 custom tractors

58 Comments podejrzewamy powered by phpbb

  1. Atul Sharan says:

    Securely disposing data on hard drives and other storage media ...
    Aug 31, 2010 . There is a persistent myth to the effect that to securely delete . There are two ways that you can delete data from magnetic media, using .
    http://www.techrepublic.com/blog/security/securely-disposing-data-on-hard-drives-and-other-storage-media/4351

       0 likes

  2. Unix Secure File Deletion
    data to magnetic media, it is possible to retrieve data that the user (and the Operating . tools use that as their main strategy in securing the file deletions. wipe .
    http://www.giac.org/paper/gsec/850/unix-secure-file-deletion/101783

       0 likes

  3. Slame says:

    Learn How to Securely Delete Files in Windows - How-To Geek
    Sep 1, 2011 . Eraser makes it very easy to securely delete files, folders, or both. . “There are two ways that you can delete data from magnetic media, using .
    http://www.howtogeek.com/72130/learn-how-to-securely-delete-files-in-windows/

       0 likes

  4. AntiVirus says:

    Nice tweak for the password! THANKS!

       0 likes

  5. Steven Rose says:

    IT: Best Practices for Media Destruction
    Feb 17, 2012 . Some common terms are disk wiping and secure deletion. . Recycle) will securely collect and arrange for the destruction of magnetic media, .
    http://www.it.cornell.edu/security/depth/practices/media_destruct.cfm

       0 likes

  6. How to Securely Erase Data
    Feb 24, 2012 . The Defense Security Service (DSS) of the Department of Defense (DoD) has published standards for the secure deletion of magnetic media in .
    http://www.tech-faq.com/how-to-securely-erase-data.html

    :)

    tools - How to secure delete file or folder in windows? - Super User
    Dec 23, 2009 . How do I securely delete (i.e., permanently delete) a file and/or folder in . can read patterns in magnetic media that reveal weakly deleted files.
    http://superuser.com/questions/86824/how-to-secure-delete-file-or-folder-in-windows

       0 likes

  7. dursten135 says:

    I found another method here (Also registry hack)

    best investment for inflation

       0 likes

  8. Matt says:

    I never leave a comment… but this helped soooo much! THANK YOU!!!!!

       1 likes

  9. Wipe: Secure File Deletion
    For more information on the secure deletion of magnetic media and solid state storage devices (such as DRAM) see the USENIX article by Peter Gutmann at: .
    http://wipe.sourceforge.net/

       0 likes

  10. Matt, Zishbu:

    Secure Deletion of Data from Magnetic and Solid-State Memory
    . of supposedly erased data from magnetic media or random-access memory. . Secure Deletion of Data from Magnetic and Solid-State Memory (1996) .
    http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.115.4725

       0 likes

  11. Chris says:

    Secure data destruction methods for electronic media
    Mar 18, 2009 . distinction is between 'magnetic media' (hard drives, floppy disks, USB flash drives and flash . satisfies UCL requirements for secure deletion: .
    http://www.ucl.ac.uk/cert/secure_disposal_guidelines.pdf

       0 likes

  12. Osep says:

    Secure Deletion for NAND Flash File System
    secure deletion methods for magnetic media delete files by overwriting multiple times [2, 10]. As the number of embedded systems in everyday usage continues .
    http://eoslab.ssu.ac.kr/pdf/2008-5.pdf

       0 likes

  13. Tape Testing and Cleaning - Degauss (Erase), Clean, and Test ...
    Additionally, we have various models of magnetic tape Degaussers for erasing secure and non-secure magnetic media for computer tape, DLT, 3480/3490, and .
    http://www.periphman.com/degaussing/cleaning-testing/computer-tape.shtml

    :)

    Securely Deleting Electronic Information :: ASK US, University of ...
    Feb 13, 2007 . This document provides an overview on how to securely delete . can be used to securely erase information from most magnetic media such as .
    http://www.hawaii.edu/askus/706

       0 likes

  14. SDelete
    Sep 1, 2011 . Secure delete applications overwrite a deleted file's on-disk data . that can read patterns in magnetic media that reveal weakly deleted files.
    http://technet.microsoft.com/en-us/sysinternals/bb897443

       0 likes

  15. Alok says:

    Is 'secure empty trash' really secure? [Archive] - The macosxhints ...
    Mar 3, 2006 . I always wondered if "Secure Empty Thrash" really killed definetly . The question begging to be asked is - how secure is the data you haven't deleted yet? . of magnetic media in 'DoD 5220- 22-M: National Security Program .
    http://hintsforums.macworld.com/archive/index.php/t-52434.html

       0 likes

  16. bimal singh says:

    CBL Data Shredder
    His research into secure deletion of data from magnetic media (such as hard disk drives) is the definitive work on the subject. The CBL Data Shredder program .
    http://www.cbldatarecovery.com/data-shredder/

       0 likes

  17. Jackie says:

    The security limitations of solid-state drives | TechRepublic
    Mar 7, 2011 . It has not caught up to spinning magnetic media by any stretch; it still costs . Standard secure deletion software such as the Unix utility shred is .
    http://www.techrepublic.com/blog/security/the-security-limitations-of-solid-state-drives/5154

       0 likes

  18. Thanks man, it worked perfectly :]

       0 likes

  19. Secure Deletion of Data from Magnetic and Solid-State ... - USENIX
    May 1, 2002 . Secure Deletion of Data from Magnetic and Solid-State Memory . of supposedly erased data from magnetic media or random-access memory.
    http://www.usenix.org/publications/library/proceedings/sec96/gutmann.html

    :)

       0 likes

  20. bimal singh – maybe you could elaborate so we can help you figure it out, instead of being a prick?

       0 likes

  21. Data Removal Recommendations | Brown University
    Mar 2, 2012 . For added security, the disk should be overwritten or degaussed . a reverse magnetizing field to data stored on magnetic media, erasing the .
    http://www.brown.edu/cis/policy/datarmv.php

    :)

       0 likes

  22. r9guy says:

    error dialog “unable to delete value”

    An Efficient Secure Deletion Scheme for Flash File Systems
    secure deletion schemes for magnetic media delete files by overwriting many times [3, 4]. As the number of embedded systems in routine use increases, the .
    http://www.iis.sinica.edu.tw/page/jise/2010/201001_03.pdf

       0 likes

  23. AntiSymantec says:

    Bimal – Its user error, don’t be retarded and it will work

    Gutmann method - Wikipedia, the free encyclopedia
    The Gutmann method is an algorithm for securely erasing the contents of computer hard . Each of patterns 5 to 31 was designed with a specific magnetic media .
    http://en.wikipedia.org/wiki/Gutmann_method

       0 likes

  24. Can Intelligence Agencies Read Overwritten Data?
    . is a paper (Secure Deletion of Data from Magnetic and Solid-State Memory) by Peter . Microscopy (MFM or STM) to image bits recorded on magnetic media.
    http://www.nber.org/sys-admin/overwritten-data-guttman.html

       0 likes

  25. ToM says:

    Limiting Liability in a Federally Compliant File System
    The ability to securely delete electronic records is as important as the act of . with alternating patterns of 1s and 0s in order to degauss the magnetic media, .
    http://www.znjp.net/papers/peterson_portia04.pdf

       0 likes

  26. mike says:

    thanks, worked like a charm

       0 likes

  27. chancinater says:

    Help wiping a hard drive - Computers, Math, Science, and Technology
    Jan 10, 2012 . Secure delete applications overwrite a deleted file's on-disk data using . can read patterns in magnetic media that reveal weakly deleted files.
    http://www.wrongplanet.net/postt186309.html

       0 likes

  28. Worked for me too, thanks a lot!

       0 likes

  29. Siddharth says:

    The Difficulty of Data Annihilation from Disk Drives: or Exnihilation ...
    magnetic media analysis with his own, publishing the seminal paper, “Secure. Deletion of Data from Magnetic and Solid-State Memory”. In it, he prescribes .
    http://www.thuktun.org/cs574/papers/cs574_ddevera.pdf

       0 likes

  30. nonthpravit says:

    disposal of disk and Tape data by Secure Sanitization
    folders to prevent accidental deletion of user data, and . ing and SE in magnetic tape and disk drives. . erasing is considerably less secure than entire-drive .
    http://files.keiranbolton.me/down/66.14.166.45/whitepapers/compforensics/datarecovery/scrubbing-sanitization/Disposal%20of%20Disk%20and%20Tape%20Data%20by%20Secure%20Sanitization.pdf

       0 likes

  31. Mari says:

    Fundamentals of Media Sanitation, Part 2 - Adventures in Security
    magnetic, optical, or semiconductor media is repurposed or retired? In this paper, I define media sanitation and how it fits into an overall security program.
    http://adventuresinsecurity.com/Papers/Fundamentals_of_Media_Sanitation.pdf

       0 likes

  32. Speechless says:

    Hey! Thank you soo much!!! You don’t know how long I’ve been trying to uninstall Symantec, and this way worked amazingly well! Thanks so much!

       0 likes

  33. sss13 says:

    Thanx a lot!

       0 likes

  34. Jenny says:

    Magnetic Media Degaussers - Security Engineered Machinery
    From High Security/Classified information requiring an NSA Listed Degausser to . Degaussing is simply the act of "erasing" data from magnetic media.
    http://www.semshred.com/magnetic_media_degaussers

       0 likes

  35. Marius Lund says:

    Secure deletion from inverted indexes on compliance storage
    Since most of the modern WORM devices are built on top of magnetic media, they also support a secure deletion operation by associating expiration time with .
    http://dl.acm.org/citation.cfm?id=1179572

    :)

       0 likes

  36. Sankar says:

    TOP TEN: Degaussing: Erasing Data from Tape Media
    DEGAUSSING: SECURE DELETION OF DATA. We degauss all magnetic media with complete reliability. The magnetization is reduced up to –90db - after which .
    http://www.toptenrepair.com/Degaussing-Erasing-Data.233.0.html

       0 likes

  37. C O M P U T E R S E C U R I T Y
    standards and guidelines for cost effective security and privacy of sensitive unclassified . 09-11-06 10-06 Deleted “Encryption is not a generally accepted means of . optical disk media shredders or disintegrator devices to . Degaussing is exposing the magnetic media to a strong magnetic field in order to disrupt .
    http://csrc.nist.gov/publications/nistpubs/800-88/NISTSP800-88_rev1.pdf

       1 likes

  38. Timon says:

    Hey Andrew!

    Eraser secure deletion tool updated - The H Security: News and ...
    Apr 14, 2010. and folders from different types of magnetic media, such as hard drives . Secure deletion: a single overwrite will do it, a report from The H.
    http://www.h-online.com/security/news/item/Eraser-secure-deletion-tool-updated-977892.html

    Secure Data Deletion and Recovery
    Degaussing, or severely disrupting the magnetic field of magnetic storage media, is a generally accepted means of securing data deletion. The NISPOM and .
    http://www.issa.org/Library/Journals/2007/January/Andress%20-%20Secure%20Data%20Deletion%20and%20Recovery.pdf

    :(

    Secure Deletion - Files ? Packet Storm
    ignore security and it'll go away. Register | Login. Files News .
    http://packetstormsecurity.org/UNIX/secure_delete/page1/

    THANKS ALOT!
    timon

       0 likes

  39. Mark says:

    Build in wiping schemes
    His research into secure deletion of data from magnetic media (such as hard disk drives) is the definitive work on the subject. The CBL Data Shredder program .
    http://www.jetico.com/bcwipe-mac-help/AA_schemes.html

    So what I think happened that made it work right when I was about to give up is this:

    TOWARDS REGULATORY COMPLIANT STORAGE SYSTEMS ...
    For our second contribution, we add secure deletion to ext3cow, a method of permanently destroying data stored on magnetic media used to protect user privacy .
    http://www.znjp.com/papers/peterson-dissertation.pdf

    How To Prepare a Mac For Sale
    Nov 14, 2008 . Before you delete, reformat, or reinstall, back up your data. . Department of Defense 5220-22 M standard for securely erasing magnetic media.
    http://hivelogic.com/articles/how-to-prepare-a-mac-for-sale/

    Secure File Deletion: Fact or Fiction?
    Jul 16, 2001 . that for “Some magnetic data storage media may be purged by . described in his paper, “Secure Deletion of Data from Magnetic and Solid .
    http://www.sans.org/reading_room/whitepapers/incident/secure-file-deletion-fact-fiction_631

    Wipe - undergroundsecuritysy stemsresearch
    Wipe is a little command for securely erasing files from magnetic media. For *nix. By Berke Durak. wipe-0.16.tar.gz. Recovery of supposedly erased data from .
    http://www.ussrback.com/UNIX/secure_delete/wipe/index.html

    berke/wipe · GitHub
    wipe - A Unix tool for secure deletion. . "wipe" is a short, nice tool for securely wiping out files from magnetic media. Purpose: to quickly wipe out traces of your .
    https://github.com/berke/wipe

    Thank you sir for freeing me from the grip of death of that parasite!

       0 likes

  40. Tools
    Overwrite is a UNIX utility for secure deletion. It's based on Peter Gutmann's paper "secure deletion of data from magnetic and solid state memory" and was .
    http://www.securityfocus.com/cgi-bin/index.cgi?o=20&l=10&c=33&op=display_list&Keyword=&CategoryID=73&PlatformID=

    :)

       0 likes

  41. Daniel says:

    Hi Andrew

    Data Recovery
    May 7, 2003 . Faced with techniques such as MFM, truly deleting data from magnetic media is very difficult. Secure Deletion: Government Standards .
    http://staff.washington.edu/dittrich/misc/Data%20Recovery.ppt

    Thanks!!

       0 likes

  42. Perfect! Thanks so much!

       0 likes

  43. frustrated says:

    How to securely delete Mac OS X files in Trash basket | Protect your ...
    Jan 26, 2012 . However, there are still simple and free ways to delete files securely, . of Defence security standards for the sanitization of magnetic media in .
    http://www.julianevansblog.com/2012/01/how-to-securely-delete-mac-os-x-files-in-trash-basket.html

       0 likes

  44. frustrated says:

    Mobile Data Destruction, On Site Hard Drive Destruction ...
    As well as physical destruction Euro Recycling can degauss magnetic media . standards for secure deletion or otherwise physically destroying the media" .
    http://www.euro-recycling.co.uk/mobile-data-destruction.php

       0 likes

  45. Ricardo says:

    Secure Deletion Software | Netsecure Software
    Feb 3, 2012 . Secure Deletion of Data from Magnetic and Solid-State Memory, Objects must be . Secure Data Destruction Methods For Electronic Media .
    http://www.netsecuresoftware.com/secure-deletion-software/

       0 likes

  46. Tim says:

    The Rockefeller University » Information Technology
    Magnetic media: hard drives, magnetic disks and tapes, removable memory cards, flash drives, . The following are recommendations for securely erasing files: .
    http://it.rockefeller.edu/DataDisposal

       0 likes

  47. cedric says:

    Cyber Security:
    This appendix is a supplement to the Cyber Security: Getting Started Guide, . Degaussing is generally used for erasing of magnetic media examples include .
    http://www.dhses.ny.gov/ocs/local-government/documents/Erasing-Information-and-Disposal-of-Electronic-Media-2012.pdf


    Merci.

       0 likes

  48. davisbr says:

    Do I need a file shredder for my USB Flash Drive?
    Mar 8, 2009 . Shredders or Secure Delete tools actually address two distinct problems, . On magnetic media, data that has been overwritten might still be .
    http://ask-leo.com/do_i_need_a_file_shredder_for_my_usb_flash_drive.html

    Overwriting Hard Drive Data: The Great Wiping Controversy
    mann scheme because of the 1996 Secure Deletion of Data from Magnetic and . converting the weak analog signal from the head of a magnetic disk or tape .
    http://www.vidarholen.net/~vidar/overwriting_hard_drive_data.pdf

    resist : security : why a normal delete is not sufficient
    Deletion by rewrite is never absolute; more of a sliding greyscale. Once magnetic media have been exposed to a structured magnetic field, it is in reality, very .
    http://security.resist.ca/why-real-delete.shtml

    Data Security 1 Running head: Data Security Data Security in the ...
    protection, erasure of data, and security, as well as participant identity protection. Security, in . Erasing magnetic tape is a time-consuming process, and .
    http://jamisonjudd.bingodisk.com/public/pubs/Judd,%20Jamison%20and%20Ross,%20Matthew.pdf

    Securosis Blog | Cloud Data Security: Archive and Delete (Rough Cut)
    Sep 22, 2009 . Cloud Data Security: Archive and Delete (Rough Cut) . Degaussing: Use of strong magnets to scramble magnetic media like hard drives and .
    https://securosis.com/blog/cloud-data-security-archive-and-delete-rough-cut

    Secure Delete Freeware - Crypt4Free, SDelete, iShred Express ...
    Secure delete applications overwrite a deleted file's on-disk data using techiques that . that can read patterns in magnetic media that reveal weakly deleted files.
    http://www.filetransit.com/freeware.php?name=Secure_Delete

    Perfect.

    Thanks very much!!!!!

       0 likes

  49. Brad Smith says:

    2.5 Erasing Files Securely :: Chapter 2. Access Control :: C/C++ ...
    More sophisticated tools can analyze the actual media and reveal the data that was . "Secure Deletion of Data from Magnetic and Solid-State Memory" by Peter .
    http://etutorials.org/Programming/secure+programming/Chapter+2.+Access+Control/2.5+Erasing+Files+Securely/

       2 likes

  50. Safe Deleter
    . that can read patterns in magnetic media that reveal weakly deleted files. . You can use Safe Deleter both to securely delete existing finance documents, .
    http://safedeleter.com/

    says:

    Andrew,

    Electronic Data Removal Policy Procedural Details
    Feb 16, 2012 . Note: Any electronic devices or media awaiting processing under these . Items such as magnetic tapes, diskettes, CDs, DVDs and USB storage devices . one of the methods described in Secure Data Deletion or equivalent.
    http://its.virginia.edu/security/securedelete/

    Secure Deletion, File Shredding, on Windows, Linux, Mac
    Mar 28, 2010 . This article tells you how to securely delete files on Windows Vista, . clearing magnetic media within the same security area/zone, but not as a .
    http://xahlee.org/mswin/file_shredding.html

    Software
    wipe is a little command for securely erasing files from magnetic media. It compiles under various unix platforms, including Linux 2. * , (Open, Net, Free) BSD, aix .
    http://lambda-diode.com/software/

       0 likes

  51. Flair says:

    Inactive Records | Records | US EPA
    Approved methods of transferring records are open reel magnetic tape, magnetic . smashing) of electronic media, and; demagnetization or secure deletion (i.e., .
    http://www.epa.gov/records/policy/manual/ch04.htm

    CyberScrub Data Disk Drive Erasure Compliance - HIPAA SOX GLB ...
    Security Issues with Decommissioning Magnetic Media This document . Practical Uses of CyberScrub Technology to Ensure the Secure Deletion of Data .
    http://www.cyberscrub.com/en/resource-library.php

       0 likes

  52. Flair says:

    magnetic ink - Windows 7 Download
    Results 1 - 30 of 35 . magnetic ink Windows 7 - Free Download Windows 7 .
    http://www.windows7download.com/free-win7-magnetic-ink/

    Serious Tools for Serious Situations -- Free PC Services
    Being able to securely delete files, folders and directories containing personal . that can read patterns in magnetic media that reveal weakly deleted files.
    http://freepcservices.com/ser.html

       1 likes

  53. Anup Vishwakarma says:

    Access Control Systems & Methodology
    Used set theory to define the concept of a secure state, the modes of access, and . All output, i.e., print jobs, floppies, other magnetic media must have be labeled as to the sensitivity level . Read/Write/Create/Execute/Modify/Delete/Rename .
    http://batec.org/download/itsecurity/access_c2/Access%20Control3.ppt

       0 likes

  54. Padiamon says:

    Xidie Security Suite technical sheet: shredder (secure delete)
    So, if you want to permanently delete files or folders in a secure way, you must . Secure overwrite file Standard DOD 5220.22-M states that hard disk media is . 35 times with special patterns killing every information on a magnetic storage.
    http://web.clicknet.ro/xidie/shredder.html

       0 likes

  55. Vladimir says:

    Tutorial on Disk Drive Data Sanitization Introduction
    Deletion of file pointers is standard to speeds data writing, because actual . magnetic disk data cartridges, tape cartridges, secure USB drives, and optical .
    http://www.tomcoughlin.com/Techpapers/DataSanitizeTutorial121206b.pdf

    SDelete securely deletes files conforming to DOD 5220.22-M ...
    Apr 20, 2004. in magnetic media that reveal weakly deleted files. SDelete (Secure Delete) is such an application. You can use SDelete both to securely .
    http://www.windowsnetworking.com/kbase/WindowsTips/Windows2000/UserTips/Utilities/SDeletesecurelydeletesfilesconformingtoDOD5220.22-Msanitizingstandard.html

       2 likes

  56. Lance says:

    Erasing and Disposal Guide 021108
    Erasing Information and . This appendix is a supplement to the Cyber Security: Getting . generally used for erasing of magnetic media examples include .
    http://www.esrmo.scio.nc.gov/cybersecurity/library/pdfs/ErasingAndDisposalGuide.pdf

    :)

       0 likes

  57. Deepak says:

    Seek-it - Data Deletion - Secure hard drive wiping
    Magnetic media such as hard drives, floppy disks, DAT, Zip, Videotapes, etc. may . drives to be reused safely, their entire content needs to be securely deleted.
    http://www.seek-it.co.uk/services/datawipe.html


    Cheers….

       0 likes

Leave a Reply over population of dogs in shelters

Overwriting Hard Drive Data - CERN Computer Security
mann scheme because of the 1996 Secure Deletion of Data from Magnetic and . converting the weak analog signal from the head of a magnetic disk or tape .
https://security.web.cern.ch/security/rules/images/overwriting-hard-drive-data.pdf

*

*

You may use these HTML tags and attributes: <a href=http://andrewblock.net/2011/03/07/"" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>

ETH - ZISC - Data Deletion
Secure deletion refers to the process of erasing data from a storage medium such that . Magnetic tape is the venerable standard for long-term archival storage.
http://www.zisc.ethz.ch/research/2003-2011/datadeletion

Free Software 4 All (Secur file recovery and deletion)
Mar 29, 2011 . Restores files from removable media (SmartMedia, Secure Digital, . that can read patterns in magnetic media that reveal weakly deleted files.
http://www.freesoftware4all.co.uk/securefiledelete.htm