.WAFL (l&(��I�A{�n�s��R�dntry(y�ƣL��zA9��'+�A{�n�s��R�d�~hurl Bhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime text/htmlhvrsdata Hard-Drive Magic: Making Data Disappear Forever
New York Times Technology The New York Times
Home
Job Market
Real Estate
Automobiles
News
International
National
Nation Challenged
Politics
Business
Technology
- E-Business
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions

Click Here
Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Photos
College
Learning Network
Services
Archive
Classifieds
Theater Tickets
NYT Mobile
NYT Store
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Your Profile
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Newspaper
  Home Delivery
Customer Service
Electronic Edition
Media Kit
Text Version
Tips Go to Advanced Search
Search Options divide
go to Member Center Log Out
  Welcome, simsong
E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


May 2, 2002

BASICS

Hard-Drive Magic: Making Data Disappear Forever

By MATT VILLANO

THE State of Pennsylvania learned the hard way that files do not actually disappear when they are sent to the Recycle Bin on a desktop.

Earlier this year, after the state's Department of Labor and Industry sold a cache of surplus computers to local resellers, thousands of files of information about state employees were discovered still on the hard disks. A local television station, thinking the machines might still hold confidential data, had bought some and turned them over to a Harrisburg forensics company, which found the files in the nether regions of the hard drives. After the news broke, the company gave its findings to the state.

Corporations have also been caught disposing of computers that contain confidential information like tax records, financial documents and medical histories And even for home-computer users, incidents like this one raise a compelling question: How do you know when delete means delete?

The question is relevant for users who donate their old computers to charity, or just throw the dinosaurs in the trash.

To learn more about deleting data as a measure of personal security, I surveyed 10 products that enable consumers to eliminate files irretrievably. Though all the products were similarly easy to use, they varied greatly in scope, with some designed to wipe out individual files and others to "scrub" hard drives clean of everything, from tiny files to entire operating systems.


Robert L. Prince



Topics

 Alerts
Television
Gutmann, Peter
Electronic Mail
Computer Software
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters
Other Resources

Some products for erasing data from a hard drive:

BCWipe By Jetico, $29.95.

Cybercide and Cyberscrub By CyberScrub, $29.95 and $39.95, respectively.

Dataeraser By Ontrack, $29.95.

Declasfy By Mares & Company:, $75.

Eraser By Sami Tolvanen, free.

Evidence Eliminator By Robin Hood Software, $149.95.

Secureclean and Cleandrive By White Canyon Software, $46.95 and $39.95, respectively.

Washandgo By Abelsoft , $19.

Wipeclean By Symantec, $69.95 (a $20 rebate is available), as part of Norton SystemWorks.

ZDelete By Lsoft, $19.95.


Newsletters
Subscribe to Circuits
Sign up to receive a free weekly Circuits newsletter by e-mail, with technology news and tips and exclusive commentary by David Pogue, the State of the Art columnist.


U.S. v. Microsoft: The Inside Story of the Landmark Case

Buy this book for $24.95 .



To understand these products, it is helpful to know exactly what they do. Peter Gutmann, a professor of computer science at the University of Auckland in New Zealand and the man generally regarded as the "grandfather" of the elimination methodology, says the process is closer to overwriting indelibly than wiping clean. As he explained it, when a user goes to eliminate information on a drive, the utility he or she uses actually overwrites each bit of data with a single value: zero. After that, the data still exists on the drive, but because it has been permanently overwritten, it is inaccessible and, therefore, considered gone.

For many personal users, this one-time overwrite is enough to preserve security; few if any recovery tools can find these files in their entirety once this process has been run. The Defense Department, however, is a bit more cautious and has established a national security standard called 5220.22. This specification requires three separate overwrites, first with zeroes, then with ones and finally with a random character between two and nine. There are no commercial or black-market file retrieval products that have been known to retrieve a file after this process. In other words, the only way to make a file more secure would be to take your hard drive out back and set it on fire.

With that in mind, it is safe to say that the only products worth learning about are the ones that meet those Defense Department specifications. Of them, there are two general categories, wipers and scrubbers. The first category, the wipers, include those that recycle leftover bits and pieces on a drive: data that exists in the spaces between files, like Windows temporary files, swap files, ancient drafts of documents and Internet cache. All of these products operate in a Windows shell, promote basic computer hygiene and involve overwriting only the leftover fragments, leaving everything else intact. They all also offer desktop icons onto which users can drag files they want deleted permanently � a very consumer-friendly feature.

The second category, the scrubbers, consist of more heavy-duty applications, utilities that erase an entire hard drive, overwriting everything including the operating system. These applications work from bootable floppy disks and operate outside Windows or Macintosh operating systems, in DOS or UNIX environments. While the tools are designed for high-end corporate users, it is not uncommon to find consumers who use them before donating or reselling an old machine. In a sense, those scrubbing utilities enable the second owner of a computer to start from scratch.

Of the wiping products, the ones that eliminate individual strings of files, WipeInfo, by Symantec, is by far the most popular. It is found within Norton CleanSweep, a maintenance manager that is part of the Norton SystemWorks utility suite. Through a user-friendly, click-oriented interface, the tool enables users to schedule daily or weekly cleanups that permanently delete temporary directories, Internet cache and data files in a particular folder or section of the drive. If you are familiar with Norton Utilities, you will know how to use WipeInfo. I deleted more than 3,500 files from one section of my My Documents folder that I thought I had deleted years ago.

Other products, including ZDelete, by LSoft; CyberScrub, by CyberScrub LLC; BCWipe, by Jetico; and SecureClean, by White Canyon Software, offer features along the lines of WipeInfo's, although none offers the benefit of being part of a larger utility suite. Though Eraser, a program written by a Finnish developer, Sami Tolvanen, is not as graphically pleasing as some of these other tools, it is just as functional, and is available free when downloaded directly from www.tolvanen.com/eraser.

Perhaps the wiping product with the most interesting characteristics was WashAndGo2.0, a tool by Abelssoft. In addition to providing users with the option to delete temporary and unwanted files, the product includes a mechanism that flags potentially critical files and warns users when they are about to delete them, as well as an optional temporary deletion bin from which users can reclaim deleted files for 14 days until they are overwritten permanently. More experienced users might find these tools a bit superfluous, but for amateurs and first-time file-wipers, they provide a comforting cushion without compromising security too much.

I would be remiss not to mention the Evidence Eliminator, a wiping product from Robin Hood Software. Computer forensics experts say the product is specifically designed to thwart law enforcement officials investigating cases of evidence tampering and obstruction. After repeated e-mail inquiries, the company's director, Andy Churchill, declined to discuss how the product works or to explain the significance of its name.

The more heavy-duty data elimination tools, those that scrub everything off a hard drive, are generally more expensive and involve a far more complicated process. The most popular ones are probably DataEraser, by Ontrack Software, and Declasfy, by Mares & Company. Both of these products, on bootable disks (based on the old DOS computer language), work well and offer instructions that are more straightforward than those commonly found on such disks.

Of course, the cheapest data elimination tool can be found at your local hardware store for less than $5. It's called a hammer, and when applied with force to a hard drive that needs to be decommissioned, the results are foolproof.


Home | Back to Technology | Search | Help Back to Top

E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


Wake up to the world with home delivery of The New York Times newspaper. Click Here for 50% off.


Copyright 2002 The New York Times Company | Privacy Information
post�A{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate y�ƣ�A{L���_�#�_�~�ntry(pG;:T�d���;��&9>�L�?��M�-��url &http://www.nytimes.com/js/csssniff.jsbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmimeapplication/x-javascripthntt"8cf49540-1-19a-3b4db4fc"hvrsdata post;��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate pG;;���6�se|�#�b��ntry(W��+�m���Q�nj`'�c�F�(�zXk&q�url 3http://graphics.nytimes.com/images/misc/spacer.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"300aee6c-1-2d-3b014427"hvrsdataGIF89a����!�,���X;postnj`'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate W��nj`'ꃷ&���#�bq-�ntry( ?,b0S�-��e:qij�{aw��4�렜�c��url Ahttp://graphics.nytimes.com/images/article/header/technology.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"99147efa-23-2c7-3b01433d"hvrsdataGIF89a��RRR������'''���������!�,��X���0�I��8�ͻ `(�B����a��p,O�`�8nȆ>O���G,-���6��G�sЌZ���2WUM��/vLV hH<�X\��5\� �}]b�~p �i� �� t ��~M(�i. ghw�y7{ Z6�6�_9._S� �������9 6 � ������[�kK�S�ǮlJ� �8��r�7����8�B��Ѥ Z�����7%SP�ږc1x�Ny��O!�\p` 瀞q�1sM���R���G�ĩS~9Ctq�?�PB�z8���r󾝳7M���t�ɇJO��GQ*�.2�#q�o2kN�W��e@in�ɩ��9O�l"�������u~P}����6�JY�� �����z*� o��2unTϽe����&�Z>��>�VA�y���D�.Ń�\1��<�h�[�m�xZ�j{G%Y��Ū��%;�fj7-/�;��p��)��W07@��.7��j�V6����h��Lvp���� yx5i���: ��`���s� �a��f%��9C;post�{awXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ?,b�{aw�`�&�#�b��ntry(q-6"��>X�%�7��ej�땞5> �p�[�url Ghttp://graphics.nytimes.com/images/article/header/NytArticleHeader.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"5a4133a6-1-702-3b014338"hvrsdataGIF89az�����������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������������~~~}}}|||{{{xxxwwwvvvuuutttrrrqqqpppooommmlllkkkjjjiiihhhgggfffeeedddcccbbbaaa```___^^^]]]\\\[[[ZZZYYYXXXWWWVVVUUUTTTSSSRRRQQQPPPOOONNNMMMKKKJJJIIIHHHGGGEEEDDDCCCBBBAAA@@@???>>><<<:::999888555444333222111000///...---,,,+++)))((('''&&&%%%$$$###!!!  ���!��,z@�t�Å@Mb8Ȱ�@�@�(�� Rt�A"D���Hr�pU\� `���w�@,��;!�("�f��P���e�pq� p���A���+��� 7J �l+��<� �L�.���Yi�ִq�Sb����˷/[|,��ɯ��$1��b�*/�Bd�P���0*��Q3��g]���� e��!�=��ii�X� ���{qc,�V�p�ZN����n"�M�&���x�5�v8U !��%M������C�l��� N6�d��h#�2�����X�p��G8<s u�!��� 6h�+M#�&���GI�$]U�dŐGUaY8O$�CJ�1��"�Om�J����->5�pmtv`U�EL\�@P1[�Ce��wS�U�*U� `���z!�T�4T8�0� Xӌ��ם�LMj��-�BP1�$!qE@�W,�L�Z^.��C"pTL`��_S��T6��J���GO��@q�h�n�t\RJ��C��p�u|��EH:�`�7���FT��&�W�+-s�VN�XI5���2�L3,_I�3�V�Ʊ�F�B4`��4�)�E|;�q�"�ۅ$1��O.BȌ��#��F+�+�����Q�1� �A��Ud}�� o���𺀁F}L3ⷖM��u�� '�ƚvfNo�!!~��ٞ�3�8JR�Q��@@ �/5'����Z� ��(]^� ����ԏl"�W5!P���u���/f�����@ �J��Ґ�#��dR']߸U�,UH��'H(5���Ӹ�CET(KU!���`�$�}qK1t)i��VV��J0W�6Ֆ���B�9��4YxP,���!sG��^�JT9IZ7���U���Ec����x�M\����н�u�G��R���3����+�K��b��ḫ��@6������r2�I�C���&�%�-lbq �Q�����~y��"?�-�*�٠GH����(4L@;post�ej�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate q-6"�ej���&�#�b[�ntry((/}������I �"��ڮؕ�4q"q�^/�����url Ahttp://graphics.nytimes.com/images/global/global_nav/gn_home.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab�fff333�����������������֬�����yyy������������������ppp������,b�� �di�h��l[N�0�tm�x��|�ׁ�@,�Ȥr�l:�Š J�Z�P��\$D��H$Eo����_nS+_ "AL|w` �{ uKt�Hwy{ k�cwk�����B�Gwf�~E�� ~��f�H����|�E�w �wŽ�F���z|������GӪ� �����`��� �"\r&���z�u����C_ J�q�E+/jtF�� C�I��ɓ(S+�\ɲ�˗! ȜI��͛8s��ɳ��@� J��ѣH�*]:��;post�ڮ�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate (/}��ڮ����&�ٹ#�c���ntry(l& ���&�PPP�����؟�������!�,b@� �di�h��l뚀�0�W��@��� �`��>@��t����g,İ��WI.+��z�n�ӳ�\g���������J a;[{���u}hs����gprrd== WM J Q\_�N� I��[�V��q4��t;M� �ɡ;>C� �W^ [L Ϝb�������y������4����4��1�*����ȀI�9�$ �|1Hp�qX 1h �7.��iH�'�fpU8��A�na�r� �Z������D�liOI� L��`@�> �t���g�Hy"1��K��hU��D�j0�Din � +-��7l�ќ؏�� ��n��x}+�;postP���XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate l& P�����Y'p�#�cO��ntry(V�(�/,�� �qy1���[�w �OA����N�url Phttp://graphics.nytimes.com/images/global/global_nav/classifieds/realestate.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"de2dc07a-1-1ec-3c3376f1"hvrsdataGIF89ab������1������@@@���000```���PPP������ �����>���ppp��������!�,b@� �di�h��l뚀�0�W�����G, ��P�vM_��[Ě1#2���=��I.?��z�n�ӳ�\g���������{�v��u}hs����gprrO=  �1C�LNdM�� �  > �����q4��t<�JB��I  ��P�� V WN\������“�ȑ��w������������5�܅�M�T��+�G�48`�4�R r�_1����i�h]Ni1DB���2+�tEy�2`�^Tl�z� �L�-f�-��`�›�l���/ ��EH�����2 M�"2k+*)�2B �A��v2�Ƿ����� L�^;post��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate V�(�����Y'q�#�cN��ntry(;@?Tc�rO�;�͏�t��M�"��p6=��url Qhttp://graphics.nytimes.com/images/global/global_nav/classifieds/automobiles.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"e00c7294-1-222-3c3376ee"hvrsdataGIF89ab������1���@@@���000������ppp��� ```��ߟ�������>���PPP��������!�,b@� �di�h��l뚀 �0�W�̢���G��XPF��A $ T�@p@( ߘrK|n��:{�����=��u�~�����l2w�^A|�~ �~��t�w�����t�5vjc LH J  �� TS  WO_aJ `  �lv��x1 �  �H1ݺJW�S?�h�O»`��h@~�u�44 H����H-�Ç28Ѱ0�a �J 1�e�* @ �%º-��̊ѱ�``�ٲ����#�M����(�4.�X�#����Ͻ�O0��h��o�l:�ШtJ�Z�جv��"��(#`���c�GwN���S27.�` 0x�P_�e| 1�D�0 k������.�����~����������������Uz?7� F���> F�v_zk|p0Di3�or�u�d��0k�4�����O����x������� �;postN��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate 1��,N��W�����#�e�Q�ntry(�����%���.)I�~}��:� ��u�����url Dhttp://graphics.nytimes.com/images/global/global_nav/gn_opinion.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"d2a4e887-1-168-3cd80f01"hvrsdataGIF89ab���������������������¸�����������������yyypppfff,b@� $�di�h��l{>���s�,�;�@�y��MH4ƞШtJ�Z�جv��z��0�ǧI�p�q�,k?��~���C5:ehq3@i��2�N~zK�: 0�mCpA�I�e����y.�����e�����������������_� @ i3 Fq�ɑҔ�Y8� :��3di�03 ����Y Ό�A�@�<�����ǥ�= *\X�Ç#J�H��E^!;post~}��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ���~}�� E�����#�e�h�ntry(�� ��Z+G5����^G�ع�΃8����url Ehttp://graphics.nytimes.com/images/global/global_nav/gn_features.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab���������������������¸�����������������yyypppfff,b@� $�di�h��l{>�K<��s ����ʈ��p��tJ�Z�جv��z��0� ����fP€0�� Hk�%�� b�����fh�p0~ 0{ C5F�v�A:k�^3 ���0 <���EG�@�q mv����`.�����{���������Ͽ���ս� � eg� 3 ���sz�� ��S�G1���2�`�A?�͓B&ւu�����4`��:lܵ��/�J�\��˗0cʜI���f!;post^G�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �� ^G�o�����#�e���ntry(�ˎ�ZKgn�dB)� s�+�����%��b�s�b�url Qhttp://graphics7.nytimes.com/RealMedia/ads/Creatives/tripcom09-nyt4/86x60May.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89aV<��f�PP�������� y�����PP��� ߯�@@�������kff���ϲ@@�ppҏ��������00����pp�忿�``���p؟�((~�����������گ�ϟ��jj��00�!�*,V<��@�pH,�Ȥr�Lz�ШtJ�Z���T��z�`+7L.���z�M��p�;NWϱ#I��� &�TwV {R�C"O'  �[^�#a$$^ D� O� ������ U#zP~�]�B��O�&�ûh�Z�U�O�C�Z����'ݾ�Q�U.���R(넴�$&� �M)8`���P�@�Bz�pB�ǐ!��Ą0�j�����9H�*! �?\�EDġ"Er(EC�W�lJ�u@3;���hP"� �Z$�RpU[��� �匒��V$�d�R*P'�����ȊB�x�N�u��W�"�#rVS�H�B�&�)B ���c���(�,D2�(tX�&u���&2��"~oCI�AY�t]|#$�p�D�ԍW,J�) :T�5!��*��Q�����C)��A���aQ�Ξ����]��� �rOȢ�x��[ ��C hJU�S#����t��yP�����([�x&��kE�u ΔՀd�(D�Cd����|O�XHЁ��y���iݑ&a�_QH����@YWD�N'�cH�pO��|�}e,h�qo~ @u� aې�Փ6T!`Ka<��FW�?l���~�)�F�^���T��j��!�g���g �ak���k��+���BYl�M$���6���F+���Vk���f����v;�!$�.�$�{�P�s��X�A�@�A��B���B���B»O���Z@�C���FĆB+%p��@�~�����ȋB����-Z�|����B ��{���;�8܀�#��1�E��í �2W4�C�\3��:|3�O���T� ���ZH�Op��K@���4=gʹ����u��Z���� X�5!�L36��T\w���C� ��J' 0[6ݬ� �u�L�6Ʌ�0��������>�ɶ�=-��6禋D O�3�g���2�HG7�����""n��w�����/���?m;post s�+XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �ˎ� s�+���$�#�eb!�ntry(��h���ʄ�U�x}������n����/��v8 @"x�=�Ƒ���f��tJ�Z�جv��z��x f�� �F���vƇ`��fhjd�����Hholv 0p: s�nG���@{ 8 ~pH��o�z0 6��0�B���Æ.�����m����������������� �n J�?Hs߶8 �� ����Y gkm�8� ���l�%%~h��Â�_U��i��遷$ElxC�`�^�*:�81K/S�\�jI�fk8s��ɳ�ϟ@��;post����XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ��h����k�����#�f���ntry(n�v��H�i�x',ptCtg�/�h�}�%jn���url Fhttp://graphics.nytimes.com/images/global/global_nav/gn_newspaper.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab���������������������¸�����������������yyypppfff,b@� $�di�h��l{>���Ͻ�O0��h �]�#`�A�{8�J�p��xL.���z�n��`�]��/o�=wU10}�L<7wU\^p����fG�7vxs [�� 1���������br�wK���D� } 7� R�KϺ7���»���c.����������������������G?�� x� Q. h�M1*ws(�?��t�'�HOs��b�@�BQ�(A��7V�����G&p�F)�,���Zb����|pt�J����j�ʵ�ׯ`�� ;posttCtgXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate n�v�tCtgƸ����#�f���ntry(��9� ��Vi�)Nj��M����S�R15C@�url Ahttp://graphics.nytimes.com/images/global/global_nav/profile.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab��>>�����ѸNN�^^��##� ̀�ԓ�弼�nnܧ��00�������,b�H����*\Ȱ�A#J�H��ŋ3j�ȱ�Ǐ C�I��ɓ(S�\�r%� @�`��D `@M� p��I`4�$��dF @��7s�D � � �g�� ����V)�� UP�Ģ�������}0�iP�� A���B@0^�{<` ��:/`@�b��@0�6@����U q�Q�2o&�y�L�7!$` ���R<�@�m��8�ֳiѓ�0�ko�P�| qp��#�T��[� ��[`��p���D���@�}�~`�a)Dx�s{�v� @o��Zp65a��rRED�QXe��?���\�1��E�i6�Y_e�]�`��!�Wp0�[ۅ'N)`�s?�eT~�v DƵW#eQ�@��0P@}���k���� `OqAert2�� P@`��Rn����Dt�<�!��d��i�駠�*ꨤ�zQ@;post���MXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ��9���M%��r\�#�f@�ntry(:�����TƤ"���!�3��fT٪��2:G�`dwQ�url 4http://graphics4.nytimes.com/images/misc/spacer.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a����!�,���X;post��fTXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate :�����fT%ѷ&���#�fQ-�ntry(�&���z���u�j�W�@$� ��PfS�3�h���url Fhttp://graphics4.nytimes.com/images/global/global_search/tools_01.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a� ���������������������������������������������������������������������������������������þ��������������������������������������������������rrrdddUUUGGGDDD999+++)))vsj���!�=,� @���pH,�Ȥr�\(ШtJ�Z�جv��z��xL.��贚�d�\�D#�b���� i/5.0u~B�I[#U;;R77T�P�R��P9�Q�;�9�������T��Q�P��������S��������k������jJ.2p%tE8ωBՂ��}C�H+�Z<6�UĨ��S��Q���������鵶������+�,bs�[ư�Ç�,�H��0`�@��  8p���( ��R�K�bʔ ��͛8s��ɳ����@� J��ѣH�*]ʴ�S��JM"�E�'`�]��2��������d#�]˶�C%b��A���u��P��:���{w��X��=��)���E*r'S�>�:�O��|g"�g�q�Y�*�p��װc˖2���0`�⹷���� N����ȓ��ͼ�󇷣[$QB���سk�ν \�8bH+�#�,����C 22xæ$���Y�A>�5�;K_��i ��>�%���Z4�� rЧ�`�V� ֑â� �-gZc��wJ��q�g��x/��j# �ڌ��v#�<��Eq|�(��B 5`S�^�}� t���q�ٌV��ؕ(J�"hW~�;/��9��i7&��>�)'DJ����U ޢ�F�V4�-\| iC�Ӓ�Q���a=SH �ϝ<5��_��hӪ]�v���p�ʝK��ݻx����/�xd Nd6��È���'�B?d])I�_� "cN�1ђH ��U&��ȥ��†��#BԺdA�`���ae@j�]�n\���P:���볅h�g�Y�L(i2ԣg�|�t�*�eY�ĺ��l���6�Y2���ftdw��g�IOmd�ܲ�.�x�d�(�R�RL̗����b�W�I��aŬh�W*�(�a0��׍8��9��֏@)d !;postb Q�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate lԜ�b Q�,����c�#�g#��ntry(U[^ �:7ڑ�>��}��W��m��0�P�� ��k�url Fhttp://graphics4.nytimes.com/images/global/global_search/tools_02.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a.����!�,.@ ���� ��tZS;post�W��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate U[^ �W��1D�����#�gk5�ntry(u��^6$�zWЩ;Ф��7�!6e�\��(23��url Ehttp://graphics.nytimes.com/images/global/global_search/tools_04.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a0����������@@@������������PPPMMM���ppp������YYY000���qqq ������!�,0@�` �di�h: @�p,�1��x������`�&��������h)&�� 0�p<���z�n�o�x ?N$��0�WY�^`/DFrq<>���*���E��������tE�����B�/w/L- O . �� �.�. y�Y_�U�Z��a��/I/� ����-��X_�f��d���;t=����������!;post7�!XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate u��^7�!3���c�#�g�U�ntry(M��N�cA��O��CX��f�h}�-����=e�url Fhttp://graphics4.nytimes.com/images/global/global_search/tools_05.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a.�!�,.@���� ;post��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate M�ڝ�6���}�#�ge/�ntry(��O�|zV�񋨴���.����2�C�]]���p�url Hhttp://graphics.nytimes.com/images/global/global_search/gs_submit_2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"d75a2e46-1-116-3c5f128f"hvrsdataGIF89a�3�������������������������Vx������Ɯ�����Or����@����������������!�,@�` ��0��(R ϲ ��&��;a��BKH4Ґ�Qe1x8 ��1XTF���h�9�@xL+��iѴz�n�ߝ~�;"  } EN  �m74 Xd�Y ��Nn����3�2����G��#~�����|�"!;post.��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ��O.��7⸄��#�gp�ntry(�e�� �fޑY�Wq�߳�Z(^���b���J(���url Ghttp://graphics.nytimes.com/images/article/functions/emailArticle2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"9ffc5e2c-1-230-3b01431d"hvrsdataGIF89a�����33�f���jj���䙙�ZZ�MM�ww�������AA���ݑ�Ȯ�����������������������,��� �dih��l�p,�t �p�|���N� ���-�S:�P�@�Z �bt��N�,j��-��S8��j��<0P�(D�5 �)sr�)�/ ~, p{,�g/ijl(ndq.w �|��(�4r�+u/��,�bb�o�-q  �� u��� z�~ ��)�t(�Ƹ �(� ݱ(i`涚� q{  {ã(Ʀ ��C@� �Pd�5�Z=����8�h��,j֨s+�=� @`S�j��W��M7� 8�b���$F�����, 0��劕1)p��$����fjU�OkQ���k�`�4�7A���� x7�F�9�6!pX/A�T��zS���* ����o� �JPJr�`�H��₊ (��L�t��$Ȕ^��װc�fM���۸s�F"������ N����C;post��Z(XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �e����Z(:��&�#�h�0�ntry(�|�j��s����h`�|J�l�'U�>�?p$�url Ghttp://graphics.nytimes.com/images/article/functions/printArticle2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"e9d7abd1-1-2cb-3b014322"hvrsdataGIF89a��������������������f33�AA�MM�ZZ�jj�ww���‘�ȡ�Ю�׻�����������������������������������������������������������������!�',��@�pH,�HȤr�l:�ШtJ���C G��p�����iH��pS������6R�&� tx���Nz~JpH����v�ro}ce���T{Lr��KMU�� K�T�$�O��w�!�q��I�$ ��T�w��N̂������ι�� $�$���J�� ������$ ���� �H"|kP��;{�r�Sp A�S��ę�@�0@׫[� �Xa�U:J�k���&�#�h$��ntry(М�^�U���o}~.c.�x� ��I �Og6 ����url 5http://graphics7.nytimes.com/ads/starbucks_logo3.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a�&�fff���������?�e���f���˺/�X���uHO�rY�z�����̙��f3���!�,�&��$�di�h��l�p,�tm�x��|����pH,�ȓc�l:�ШtJ�N����x��xL.��h�#�mIݴ|N���m�{����bxyX{"}���r��?Z\���j�A�&������A�"�����#��������p���D�[�"�"���[�ĵ�Ǽö|�Ӏ�?����ܴ�#����✓��t�>��o���������Ś�ч��i�C�=X[�;��`…S%��&���c�Px�/h��E2f��2p�B���HQ�-/�(p�D�"x!���D� �3 �X s�(���� ������JE��XU�N}p&0�& �"�΄6�W�^c�� �֜�� K�9@�p�"�u�b�>� A���XpW��CQGP�s�� ]-����(�քdȂ N����ȓ�������#�L`���H�ОZ��/AG �;�kx§9G�K*N �1Y򡣛pL§���y�9EB���[>�fv!X_"��V|��@� �I7�b�m�Z�TN �f[% UinP@���N%z�Vxa�a�2��B�9ڄ�&aMn�V! \-�5n2J�U���95�mq��ߏ@€�*��� Fp�AV�*�QJ�Y'�s҉�8�YB�{bԧ��� �y�T����p�1��ɣ��>���f�i Ơj��h:�-U�(�꨺� �Š����P�����+�z�z�;�eű�&�l�6���F+��1�;postx� �XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate М�^x� �CC����#�h���ntry(y�ƣL��zA9��'+�A{�n�s��R�d���url Nhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.html#GlobalToolsbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime text/htmlhvrsdata Hard-Drive Magic: Making Data Disappear Forever
New York Times Technology The New York Times
Home
Job Market
Real Estate
Automobiles
News
International
National
Nation Challenged
Politics
Business
Technology
- E-Business
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions

Click Here
Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Photos
College
Learning Network
Services
Archive
Classifieds
Theater Tickets
NYT Mobile
NYT Store
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Your Profile
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Newspaper
  Home Delivery
Customer Service
Electronic Edition
Media Kit
Text Version
Tips Go to Advanced Search
Search Options divide
go to Member Center Log Out
  Welcome, simsong
E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


May 2, 2002

BASICS

Hard-Drive Magic: Making Data Disappear Forever

By MATT VILLANO

THE State of Pennsylvania learned the hard way that files do not actually disappear when they are sent to the Recycle Bin on a desktop.

Earlier this year, after the state's Department of Labor and Industry sold a cache of surplus computers to local resellers, thousands of files of information about state employees were discovered still on the hard disks. A local television station, thinking the machines might still hold confidential data, had bought some and turned them over to a Harrisburg forensics company, which found the files in the nether regions of the hard drives. After the news broke, the company gave its findings to the state.

Corporations have also been caught disposing of computers that contain confidential information like tax records, financial documents and medical histories And even for home-computer users, incidents like this one raise a compelling question: How do you know when delete means delete?

The question is relevant for users who donate their old computers to charity, or just throw the dinosaurs in the trash.

To learn more about deleting data as a measure of personal security, I surveyed 10 products that enable consumers to eliminate files irretrievably. Though all the products were similarly easy to use, they varied greatly in scope, with some designed to wipe out individual files and others to "scrub" hard drives clean of everything, from tiny files to entire operating systems.


Robert L. Prince



Topics

 Alerts
Television
Gutmann, Peter
Electronic Mail
Computer Software
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters
Other Resources

Some products for erasing data from a hard drive:

BCWipe By Jetico, $29.95.

Cybercide and Cyberscrub By CyberScrub, $29.95 and $39.95, respectively.

Dataeraser By Ontrack, $29.95.

Declasfy By Mares & Company:, $75.

Eraser By Sami Tolvanen, free.

Evidence Eliminator By Robin Hood Software, $149.95.

Secureclean and Cleandrive By White Canyon Software, $46.95 and $39.95, respectively.

Washandgo By Abelsoft , $19.

Wipeclean By Symantec, $69.95 (a $20 rebate is available), as part of Norton SystemWorks.

ZDelete By Lsoft, $19.95.


Newsletters
Subscribe to Circuits
Sign up to receive a free weekly Circuits newsletter by e-mail, with technology news and tips and exclusive commentary by David Pogue, the State of the Art columnist.


U.S. v. Microsoft: The Inside Story of the Landmark Case

Buy this book for $24.95 .



To understand these products, it is helpful to know exactly what they do. Peter Gutmann, a professor of computer science at the University of Auckland in New Zealand and the man generally regarded as the "grandfather" of the elimination methodology, says the process is closer to overwriting indelibly than wiping clean. As he explained it, when a user goes to eliminate information on a drive, the utility he or she uses actually overwrites each bit of data with a single value: zero. After that, the data still exists on the drive, but because it has been permanently overwritten, it is inaccessible and, therefore, considered gone.

For many personal users, this one-time overwrite is enough to preserve security; few if any recovery tools can find these files in their entirety once this process has been run. The Defense Department, however, is a bit more cautious and has established a national security standard called 5220.22. This specification requires three separate overwrites, first with zeroes, then with ones and finally with a random character between two and nine. There are no commercial or black-market file retrieval products that have been known to retrieve a file after this process. In other words, the only way to make a file more secure would be to take your hard drive out back and set it on fire.

With that in mind, it is safe to say that the only products worth learning about are the ones that meet those Defense Department specifications. Of them, there are two general categories, wipers and scrubbers. The first category, the wipers, include those that recycle leftover bits and pieces on a drive: data that exists in the spaces between files, like Windows temporary files, swap files, ancient drafts of documents and Internet cache. All of these products operate in a Windows shell, promote basic computer hygiene and involve overwriting only the leftover fragments, leaving everything else intact. They all also offer desktop icons onto which users can drag files they want deleted permanently � a very consumer-friendly feature.

The second category, the scrubbers, consist of more heavy-duty applications, utilities that erase an entire hard drive, overwriting everything including the operating system. These applications work from bootable floppy disks and operate outside Windows or Macintosh operating systems, in DOS or UNIX environments. While the tools are designed for high-end corporate users, it is not uncommon to find consumers who use them before donating or reselling an old machine. In a sense, those scrubbing utilities enable the second owner of a computer to start from scratch.

Of the wiping products, the ones that eliminate individual strings of files, WipeInfo, by Symantec, is by far the most popular. It is found within Norton CleanSweep, a maintenance manager that is part of the Norton SystemWorks utility suite. Through a user-friendly, click-oriented interface, the tool enables users to schedule daily or weekly cleanups that permanently delete temporary directories, Internet cache and data files in a particular folder or section of the drive. If you are familiar with Norton Utilities, you will know how to use WipeInfo. I deleted more than 3,500 files from one section of my My Documents folder that I thought I had deleted years ago.

Other products, including ZDelete, by LSoft; CyberScrub, by CyberScrub LLC; BCWipe, by Jetico; and SecureClean, by White Canyon Software, offer features along the lines of WipeInfo's, although none offers the benefit of being part of a larger utility suite. Though Eraser, a program written by a Finnish developer, Sami Tolvanen, is not as graphically pleasing as some of these other tools, it is just as functional, and is available free when downloaded directly from www.tolvanen.com/eraser.

Perhaps the wiping product with the most interesting characteristics was WashAndGo2.0, a tool by Abelssoft. In addition to providing users with the option to delete temporary and unwanted files, the product includes a mechanism that flags potentially critical files and warns users when they are about to delete them, as well as an optional temporary deletion bin from which users can reclaim deleted files for 14 days until they are overwritten permanently. More experienced users might find these tools a bit superfluous, but for amateurs and first-time file-wipers, they provide a comforting cushion without compromising security too much.

I would be remiss not to mention the Evidence Eliminator, a wiping product from Robin Hood Software. Computer forensics experts say the product is specifically designed to thwart law enforcement officials investigating cases of evidence tampering and obstruction. After repeated e-mail inquiries, the company's director, Andy Churchill, declined to discuss how the product works or to explain the significance of its name.

The more heavy-duty data elimination tools, those that scrub everything off a hard drive, are generally more expensive and involve a far more complicated process. The most popular ones are probably DataEraser, by Ontrack Software, and Declasfy, by Mares & Company. Both of these products, on bootable disks (based on the old DOS computer language), work well and offer instructions that are more straightforward than those commonly found on such disks.

Of course, the cheapest data elimination tool can be found at your local hardware store for less than $5. It's called a hammer, and when applied with force to a hard drive that needs to be decommissioned, the results are foolproof.


Home | Back to Technology | Search | Help Back to Top

E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


Start the day informed with home delivery of The New York Times newspaper. Click Here for 50% off.


Copyright 2002 The New York Times Company | Privacy Information
post�A{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate y�ƣ�A{HU���g�#�g���ntry(��|�{�U����#ع?�V;DpLu6�s/��=9X�url Fhttp://graphics.nytimes.com/images/article/functions/mostEmailed2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"e87a3f34-1-300-3b01431d"hvrsdataGIF89a��������������f33�AA�MM�ZZ�jj�ww���‘�ȡ�Ю�׻��������������������������������������������������������������!�$,����pH,�Ȥr�l:�ШtJ�Z�҂v��r��x( !O' �6��L�ۓ�`����sw��cy~������Ty�����BB ME� � �G��J�EF�B�E v���������CH� �I�I�E�F�I���Ø��  �� �����ү �rp�ݮu((�4*� � Y�@�! pPꗫ�{P�BjU �����M8����� H��J4�S�"D�/�;Z "L��$���" �8�ʸ�(�BL��U²\c����O[c�x&u�[ �Jl�O��e�� posti�XhXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate w�-�i�Xh3Z���i�#�iq ntry(‡`��W4�2�I,,X��M>0���\�3R���url 1http://graphics.nytimes.com/images/dropcap/t.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a!����������スք��BB�!!�!�,!@t0�I����A9`]iz�H�,��-���zt����ڱ�/ n��n�i��f/W4�~V!5�A��F/��ה��3-@�9��@�� ���>���f}XdWD��I�����[�~��d���&;post��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ‡`���57�&�@�#�j���ntry(s�k3����BD���8�UCJ�!1��>��#[>�url Jhttp://graphics.nytimes.com/images/2002/05/02/technology/02basi.184.1.jpgbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/jpeghntt"6b2a98ac-35-59df-3cd07c35"hvrsdata����JFIFdd��DuckyF��&Adobed� %3:�Y����    ������ 10!"2@A#34$PD%  !1AQa"2q���BR#��br �т���3Scs0��C$@��4DT⃓�t�%5!@ 0�1QAa"`p���P���q�R!1AQa�q�� �����0@�P�� ��u��"VG3l|$ u��}��ʓ_���Ѧ��o���I���ս{��3�>����e3�1�q��Jݤ�LW��m[j��f{R��x���|��G��N&�Q%�f�Y�j̅ϥ&��g�ã���v���^�t /m*��B�l�3�ь>��F�ռJ�0���45��� !��E�Z mJ��^�2�4�ub�c{�U�ڜV�f^�� ����s1�d �c����C*�=Ƶ�5; u�X���e��eQŎ����L7��뵅X��0��w�=��=�u�u�6����3��Ͳ\�S�N-Ve���B�fy�������������nT �L��}Uْg���Z���EM�)2���/��"��I�Q��0��z�T���ީ�9�m�i��ҵ���cz��hW�rw���Y��0�]x�js��g�j��� ��ɥ$V�t� �����%�s���� ��ġ�����j�^A����ޞ�;�ޖ���%��j�15�)^[,�W�F��Z�KR�.��I�ۚ�~�9o�c�S�F����ˤ��:9�K�>�E��^E�� ��£w��Y2�Db��kT�׶d[]� �����������n���ӻ�Q-�k��B�˅��n�n6޲�V��u��ϻu"�zߟ� Ǫ�?R�҂ϵ��oN�=��1�\��Uw�K�beQ���5����H�S����Sŧ_�}@럦���z�c֍aY�ggU���\wa3��j�i�im&I�ٸ/C�瓵� �?;SA�� g"0�'�bx�{��Ж��gAm����螔ľ�o͝��vϐ�\��q��;����n�.��"�a�󽹠��T�D�yZ<�'J�����|����nϥ\�5�ء%--<�X�/+��)S-�%T�OS�^C�հ�S��]�V�T���^�&1���)v�6ɺ ��[�C��5��^�m��V��vd�L� +eS�����g�s]jM1:�z(27�b�N��^��ZͅMgW�,.~^���,�۾[vx�<t��)i�vdm��d�������J����¥OO&/��:.�7�Q���6�hv������������B&f���Au[�>o��=��[:t_��6��>��B�-#OK���c)�˵j��Q7ћ���u!G-VX�R���n-K� �0��ح�M��gQ�r��2�X'<�t�h����/YbؽWzޠ,a��cܚ�����ݐ�r��+W�P�<;����oI�r������6�x�� �X�o�]��s�2z+^hꔩ10$�¯�㳄���bu-�Sv��h��㳴�2e��'�;�K��%�@"�;��q� ����(�*���(��3�<�����w�jU�,28��ˍ�� Q���M���s5�+��q���X��{���o6~I��>�c��]� P��k�i�Z����I �;�qv� ���6r)����(���W'��B�ϧ0Z�����`�����p��w _��O �$O���{�d_��q����h�QH��⨿r���d���a{�>o�l��lB��֖)��f���,Y�쎥6ݞ9nG[�c����&�F���4>n�`�P��/����\�,`�(u�i��{u�k���2�삿;�jK��Ε�A$�q�_���Y��V��]A���ZQ����^�LQ5:ň��E}���qL�bAs�:�7�I�k!e6\�C��ǎRf�n�.��������Ȧ}�w�x󚖭_�nNYc�Ju���M{9 ��F�`��㮩�.�6(����F?�{����s9��y7�nS��0d��X,��F�zgQ9����x���_[3a�A�VdP�s��q���7Nơޱ�3���^�r/o�9��h������(�5�rJ�����6g���}<�Gp܅�y�V��YFq�Q����ⵇ������N;�� �R�CZ���C y^@�#���u�����/����cO�oR?�1f90����+ϩ��V�D�&l��=����\�C�J�6�=3]k0�&��V�.&̍���2�ŧ������^b�ӽGX��F��� �V��W�*�b� C�� ��b���S{��;���g�c /1zݕ�܉k%��=�4NsqZ�%>uJ؅֡���89 ynk<"f9���wD�����m���J� �j��b����w֭�?e�*T�� B&IS5�G�\J-6������̗y�Q�_�m����H)&nD��D�7��;���UNa������@F������]a����O,��Q�ӵ�H�dzk��%�-CY�i��cҵ[�=��BJ��R��5�iQc̆=��i �\�6R�c5kx�[[*4� ��ۑ���b_3��� ����t��Z�q���p]t�n��>\Gnr�J��ի���el�:v������  �+T��7��+*��°�������VŴ-�l[B�а��� j-�i[��:e{鐷,낶���g��nY�i^2��� �J�/��=D��#+Ķ�#;6��硿s��#�Z����|���-�r����uL�Ÿ����-�E��°B.α�j:y����v���/r�h� �~Z�>⎁wA�4&�<-�j�>�����Ѫ�3@R��ۓ�N$������{��J�nx�/mO����C�'J�l��}�A��� #����T�H��I �v�ֹ��;˘�A[H~��տsT]�:�/|]���D)byM�b+�avq�:w�EW��hur�� -�Z�PE�%��a� �1��2�� �P��\����Z����i4���YW�ċ�#�//ʈa���_��S��cZ�*�%�h���k�^�ֱђ}�C;t;��vJs�g8U�۰��.XD��zXpHCWv����k\Z|����.z ^�Y�( �����pGC�t���j��c��-�,�,��� �=q�>���O�iM�[�{�����Ǡ��N�K���{��B즳)�Т��Ө:~o�V�7.�a�N� ���t4(�Ց�a)�@hNz���Pt"4-��� ��%�t�D-�mXӷI(�D;��{-�g$�}0tΞ1�z0�D����;��O��#@�D� �(��{�s�������������ι[�啞����;��������Eg�޲Jض�V„h�#�-�[@[���W��xP�tI٨��j�^2�amg�MX�X�:�L�]���ucL��h�;�;t�B�B��ˣ#V�z���R�;Dr"�(�n2�أyj�˻ S�Qpj�/�����R��D ��_�GS��4 (�ph�6a�@��� f�(����D��&�'K��J͒?/��/�St�,�ѱ������b���E3��J,�6�?K��h�Q��zJgl�i���*,�G�]���B��zJgdX�A�]�K���T}����t)��������я�o��0��Ge�z���eeoX�' ��OA����.��鞈����z�gK�IX�(u���q(7�H�1�����c�P�2�z������ޜ~���� ��?����QC% E� x�i|�)I�49��FR��{�(�D ~*9q�n:XM����!�Q%� �}�t� ��!��=�>�ԕP>�a��}�)c�[-�u��:6���E�Xu7��[�B�\cm,�:��D�I���H(�=/P�:O!��RDۘ}���o{ېtm#�vG��j���*'L��Cbj_���P�#�?�f�JJ hT���@�D�r=ReQ����?�ɨ��pt�Ȥ��� l�ލͷd3�;�EXDP�X8�ٵ�֗D�˷�>tRLSe��^ �_(�������?�Rz��+�T'��.��m���GwFe��%?gX@��� bUB45g:�^=���F3�LwX�������cU�t����F5�L=�8zT#�ܽƒ:qF�S��Ј��h��B~H��]W����1�UW��O�;�ڴ�!SKX�)�J�qשK~���Dw�q��qJ����a9�Q��҄��%HF�m�器} ����|M���y�e�j���?Zq$ #2l�Fċɺ0%�P��S��8��?��KC�P�����;ʲ�٧B[�8�M�o��K�2�FP�$�ì��ƃ�ĭU�ģ���Z��u��U�p쓣YA�C�3B3L�#�)ۛ�y�K�t� ���)�vj��;'��M]ϸ��ìd�ڣ��\� �v�A�p�Ƣ1U!>�V E�%]�8S�g�x�`gd|��:"V&/�tA���%>(�fa��s�IK��l�x��J����q�I��G�#5[�Z��M]����Qc��M:}�Z�aM��!��N\QV�v��'�A�nhµ��|k[`5�$���,��B,����)�?�S�Q�GL4��)��F�5+�h��q]�����{Y��r���%$�8����ÉFBB11Y}�,݋��U�P5�Dn��+N!+y8�V�M� �0��ܓ��� :� �•�N=�)��m:7��<���+�j�9��$}�~�\#����m<x3�h1=㤧x����x�U;��2�^�9�cYY+�;�N[�Ȕ �1�[)a��y��a�-+BIm*UZy���R��,#zJ��w_�CifIJ��VR:4�NҴ���/T�8)*r�R��g� ��������^c�P�}!(m*�l���Ob3���L�\ �6��W��)��j�+�4<:�t��ƫU g�>�RGHʪ0g+/�I�K� �o[`��0���[A� *�5|��+ �)�7mވQ�7F��u��)F��;j 7��!nN�k)F���4���mB�h���@���y[FmV���t{���,� �����V�����*+�w|��o�1�~���5�?J#��<5+@���H�P=n,���5 �Cb�Ld�m�8��4�7$[S��-�7{�,:�j��L�v��]��'��tC�k>d������B����A��RyU/\H�9��`?�sm��L,?;7LZ H�BlB��� ����&����<���lU ��y6� E����T���#��2�Kq,�WLW-nm⤻u�Xs�l$-��:�M���¦q�k!�dJ�9���M�T����aS�I7��VN$����� 7$��Lxo.D��r��<�1�_}W��p�FN���)�r��ͯ���?1z��y ��[���5d�r�+� �k�c�G�t%і� �� ��.�|�����ڧ_� �**QV?��6ԡնX~X׷,��80�$o�����L��♾����T���w�H3*�Q(�y���hi6 i0~t�I�*#�Q���f�=T����zp�� %#X��Ѹ��H�II��6�!�KM�!%#@�^9���V����n4'�{��yx?�G���P=��DvG�;��`�U H2�/ǞTuPft�� xj�s_,��=�@v�U5[IH��Y�c�V�h�� [�ά��W���P�� ����g��rDo\F����~�r'Σ��4��~�ML1m��E9�& &���wZ�����ea��Xt�ys���\�P�τ�Кo���EJ>��Y1�?!A�)�:��4�S�ںM�ؔoR��c �D��,Z�� � 2���2�7����%}�-�qg7L0%�-����p��㙉�H�y6d7��r|,)T ��*�����T�*u�"����`����l$/��ԟG+��T�C����A�nۛ��,�����-�q�j�f�� � {F'z���9��al����"o:��a���N��K���j����#�.�x���5d�j�F���7)�����؝�>A�`x���f�Ⱄ���L�i3>�;&����*�{l���5�>� ���e'�Boac��m!!���PW�X�@�H�[dO�7A�7� �I�t$�i3��vwm �U�h�I���� ��2{�z�f�YZa %� ��%O�T+�\���qSJ�˄v�/T%�Rz@SnB�r��Μ���l!i�^Iv��F����(+?vr�# xmZĀHL���7㝐ws��𔛌a<�����Z9��1�6dRM�P�r������O$n�ˀ���(�R��•��1v'%br@S�R��3� ,���G,'�(�R���@�'B}f|�]j��(d̝.�� J\�D�m$OL �z� ��T'z���ʈ���,�>�vS͢J��qv� ���� ���ӎ�8l�7��a(!%�R� +�۲%|+4:jHH}�nUژ�&g-���g�T��\J�]l�0��5���`:�H�;N���i��v�d����տG��ڜ%�$�t�^ѱ0]�x%��)��WO*/ֿa���Y�'ɒf��Z�g�O����؜y�'j��Z����p����uq$��!����N�R��p�:�E'#rS��e�p�%lT�2Klv�6@Z�Pf�3kō���`��[�D\��S�0����;*�&�3�1�"F�!U ��*כ�=��8���/J~��q��B��~sK4��f[�ͥ#�F ��N�oi��+�kqM֭���C,c�B�ڸ�V������E�N���cv��R3=I����F��-�`���K��c �HNk�,`��D��J ֵ����R���F�I��!M�o?� W|��J@���]��N�i��9c�7��v�F ���Bmq�{ZS�脩Z�P�o�0�-y����;�|6L_��*���ÇU?6<�4���d��<5Z;Y������� h]�0�g���+9&��W4!~Y�n�J~�(�t��W�d�g� f�`N,.8��+=DgW2`<�G���š���9=eF%m��6�F�5^&�k���f:!��?t�x��I�Fc�n�;��Z��v�r��P��I%uj�S���U���P� �S�l4�%�6d9�ӕMF�� �Y�K$��3Sn�� `<@�[�\o��*V����Wa�Z�>�"X[m; '��9�c^��f,\]8������*a��ThN���"ɒq��N���R��-���U�� ���RR��m9-�Bv[lq�l���.�i⸃ֺON�V�hF��2}���"�J�# BvOe,o��`'"��hv�N�M`Ѩp/fJ� �D<*�m ��-JRl˵�� a ~X)�'XgU�G�`���֮�9�#���7�_�a¨��<}�����u#���h�.V�gz���`��������4F76��}�Θ�ܖ�:�ZW�ƪ�/���?!��@8o�h����?zioW���K6�t]���Ӗ���:I�Қ����3=f�W��,Q�~)}tlc�a�w��C���K���Ot_�.͖�*�k�U��� �DͶi�Ph6�T��x�ަ�My�sSW<��� �X��,߻��ܹ���u��6�W�D�[��T�D� �z�_��=�}����=����t'�ܱ宯��-�� 0�It2��8K5�B��s�����_Y�m�9�� f���Ahπ�H)�:;�� !&z�m��l�N[���V������UúG�E��y*5in��=�ɯң�_$���zfC�P�&�2�������G��5��SIv��͑�W�s g����YC�����'��Aƻ��M���������K��?�/�d�phM�q���P���Uxjf�bަm׾�%�օ���历��m�%!��X�P�#�@�J�w����t��Q��N>/�������ˈ�#]���EjW8s0���f+�qg��QxR���r� �k�ǑÓX��s7dl���X�Ux�_#z����y��8����3��0�n��YJ�Clj��i������WQ~��i�)���2��.�(V���G���.��F��{~�9����u�4N�h��~����s�)����[������~�y����Ǵ.7D��9ܠ���il����\9Q|2�cc�ʌJ�}�QV� )��nf �����9��u`n��re��%~�sŒ������ n`49�9��$k����7��4�1u�MjN���" �g��IlT<���u� ]�"�~&Ul�`/ }��� 1s�(���]c���}�ny�\��(p<@�����; ���+)���i(�J�|�|(�j� ����c����7ɒ�%}���� ��ģ�I$�-V��V�8֧��A�K:N�6е+~V�a��1�W1�26AF�,Q��b�yɞ�x�e{����=��k� ��'d�앾���X��>fq ���A:&�6F���<�Evl]Z��)�&?=]�B JtT�t=�|*Ϊ����O�}U;���j Z�:��iP��\:3�/�6��׺������ ��}��7E�L�����<?r|.'������J��,�p����{L��#0��HXW^����g�����S�����h �Jб;Ʉ�d��Y-�J�}'<4d[K��6�D���ϴ{�S� �9!:�>bhl7���>����y}l=�\]�S�������&���K�>����,�vp�)l�A��e���͖�rԕ"'�mԩ�xꃺmu��e�uaBd�Q`�ջ�b�O���_2�p��wu��W,@E�rr����}ft�+xim:���{��'e���\am�;I���ڄ�&�n �y�K�p{dY�5i��["�] �2'R<�=�>��iy@�S\#�R�P��;���� �JN�g� S����y[�¼�wfT��&�h�zN��ˣ��*di�tS��?>�=ΐ�����w����߇fO�?�/�%&��kM5���1 ����L��� WX�퀄[)_`�0��.�9���P���?y`�]���`z����Y�oXo`F+S�gD��,�9����~�醶FiƢ�w����p�u���� �/��3��=j^s1�V�Ŕ\�����4d����J ��k�����e�Ja`������v�z��%�M��!�B�R�e��B�m.u����R��03�f��v�Cj����������}����������o6o`*�q+hw��7n����4��K�����x��.^�Z���� 4c�]��q!�.���M�H�}�e{�,��������!im-�%p7*ϣ~�I��yN���� �ս�__�"1c�x���ԏ���cOj���[�F�N�]{����Y��2����2�k���%�S��  �vSS�I�����љ��C:Q&u�&R�+>.�7PA��''0� d%�b��8��حOH ��3"�"���3�Ļ�6�˩)e �o��9�Iv��3H���^���?��/����'L�p����������� ����z�ij����KO����@VT �zޓ �є���g-߬P�]��&/�-�� ��2�6���D2+�H����1��tp)ϴ�hu�[��pA(P�ħS�??RR���vzh��x���SU���JaLŃ����^_b��kk�R�n������w4��4��m����jp�|��]2�@a2jټ��RQV�h�.�h�7i�f:��]��yka�3s�9yg� �=㶜���iT��h��[�=bP��������[�{�wʢ'2�g ��]J� ���\��%��<�2�Y�?XP�^���2_ �Z�p�v��@�f���4�Z'.3O#�m��Jo@o,�G�NS(K�W�v��w?�C���#C��;>z�q0U�� Њ������Ns��j�Ncb՛`��i����5y3"q�H5��*e�Z:� �H0�l��3�j ��/�S�o�'�� ���j�}�R(l�]�d��2�V a���w�?F����4���z%���m��6m��oGTe��� �^���:�7ٓ-����Y��N������AZ����#�b�q��q{;�O��K�Y�q�Tm1/n��-a���/�����=�1[����Z�-�����o�(D��� ް�0�[�ƾ��q���m?1�BRO'/h!¢u˯�+�t����c��1�*��mz�?�8y��E�`�4y����T+���ꄮ�p~%$+\`_�| �������?!����z�b�'��=YژqO���+����|��=& ���i�ѽ�ρ�b:Dj���4�Ƽn^Ļ����xm� C��/-G�K�i��"�B���|F����WI���w��3�IV���|N��D���g���������M���f����.��ܱ[��z�� � ������ ��O8�i�����\��9 �o6C�nǭ�2ߨ�9�E�������/zOa�ϧ�������1冑�����gv{��8�<��>���Ge܎���� F�`������\[���e | ���U찾�X��3xE ���rJn�0�o-c��OS��Ə@t��0�^3P�O?���W�B񫕾˟h �<�;�3_S�Y���?��ٙ������#��MA��v��K�V�g�ڛ ��#�� ��Hgwo>{s�P�O�O~ � *��w��Lp�̠�^�gm|���~����ɷ��������H�>z��?�M�� �t�%T�5������4��'��8E/by�<��B���扒1��^��!��=���Go�v�A��&�u���8�=���\_'���u0V���h���e���z��,~���:}�Bi_?�OL�eL��g��=��K��V;W��1�=yv{��d��s��\�����"������i�������ߟ�ΜO��ӷS�jf�i��e�Q��5����ǀ)��h�����jz�������e�J�ۇ����%)���6���]�BVF=:���8�<����V@��l}!�ٚ�8�1�%C��v��Ϥ� ����s8ؕ !�Ҽ0��a�������L�?����'���R���mD� EqTJ��G�]�]�g��VcG_�U� ��� �F8�� ��T�U[�# F���ӟ� ��?�?�{�E�x����5���Ne`۞���y�KVp���c�7��,��~�pQ�T�����+��^� ��_�l?0)���N>��{�\<���R9-K��O�CX���%A,��ōK':ږ��1����?!��+�������T�Y^���~=����G�_-�J��o��n'��uJ�q14���f�g� �� ���<} F ����#�,�i�xO�P���! &��̫�XD�e0��Fo�G�P��f> K���(���@����#��Ir��N���po�~����x*��gx�nk���[Q�� d���X���rm�P?mm#��Au)�WV��W��7Id��=V�Jja*4�V�B9~�*�z��k}&Y�@�{��%��(�FdQ��yB��;�}����X����\2O�m��gkC�"�f��Y G��~I>�)��`)�v�U��̷��M*٥� �s����Y���V� ?���P*�L��&��5�/R�!a1�Z�v �2���Bu5��Ģ��Pr��r�6Y=6�Yx>8Rd3�R�#g��$OȟAK���9K�x%bXDlI���:2W.=B��LM�i���ؐ�4P�;K`���Ӓߜ`1\-`�pަz�3���<�(�>�+�%*�%3�@ڢ��rm#���Bd������\̩����ml���񻃒��-.#�A W��X�)�f�Eb�<�=S�[ݍ>�9[ ˮ�L�[+�,Q �f�81�w�: ]�4��;��ap�,��J���8�H�`�k-�/}:� ��"�-�f0�S���W����Ƥ���� �3�vQ�`���Ɨ����4�ڐG�/����*='�RP�bT��"�����JM�Fʜ���_u,Ydd_ �N`��� -�2����+6lUj�@RP � ���l�)AWHK�6Т�m����#�W!�-,Ֆ&/OH�&R�����Ԥ+JY��{� T�M�t7���p��(�,��������{�eŗ��#�%��=c���muo���c���� ]�e���Eվ��Z�l� �i8dk E�_�+�0Y�s����sV��9 ��8���A��]?@�.��uNC���Ϲ.[�;X{�v%ǿ�#PQ��/j�4�G�U����S@F,��'*�ъf{��\���s�]���V lɷY�sBQC(�YY.+³�� BŃlM�dSZ�e�dc��"�k}`�2�� �M7�aKJ�D�`�c�fZ����B0^��o�oW����%;�o�> T��O���ʳ�@6�������g� �� ���Á%·��m��%R��\��XC� ��A��jߣ��T�wM�zE�P�P��J�Fb�h (�^!-R��u����t� ���5Wi��0�-謃���W��|�?���x/�.��������c�A��Q���O<"�����r`���r � ]���47�5a5=�B�L��;T����.�]�����cRݛ� 8ʍ���]p6 ���p�$� ��̧�����0�t� �q���.F�訲�6X�ѭ-κt�y;����gw�?��z�)��@��� ��T/,��-1%pV�H�C���m�m�(��*�-B�un>@�)Z�m�,�Ό�l$�&acL���N���:�ޙ�,���E�R�"n�ӡoIv�&�l6��OpzA�T��Jk3s*�� bq�h1Bf�| gEL��˪*��:�"��j����p`��X C`��:{f�x�Ngprz_�W���) 7���Xv��\r5\L��к�r��*̛�Zj\K {�a0QR'��Y+V,����50(�%��A��4��A>��'�R��2Y\��^�~� � �����^0��Z��) ��;qe���ѪR�e}����3iA�D^�}����;����Fgڐ��dy�Ζ�q���)�N�/�o����*ō�ۄ�'r�J�JF����Fϒ�2�K��\|����`��ݧ�#�eoek�s�52�����1O[�ʬ`�j �6] e��Ej\�����i� �S�����ҳ�WR�h��7n���;�����Lv|��n��� hE��+ѹ�KRV�k��`&� �72(�6���,X��*�\�*�5l��(�l��\��D��@M���5��!t����T&^us��Ay,-��-�m��`p��Q~OqY���03�W��DKy�������-!|0ş�W���}Ά�h�v���t�Y���1}"�� Z��& IcZ ������8͢Z�KtB� [���+*2�AT6enbh�Ɣ�]V �/[bMJ�V��"��&���D*�� %��1� � �]08��"�'"�#~χٿ3��ϕ�䀝� R(� �f j��̍�� /��5���V�E%�K�<_ �� %4�T ���N���K��jŐ� [&�CE�� ��d.����u��v9}X�,�}�R��;�-���"0����t�=uxp�uNN�sn8��3�)K��#ߗ�_$�����%����h��kug�D�ɗ�@ZN�~�$�*>-'B��:X�qɁ� zv,�����ۯ�B���mYx�-. V�xd���*h�N9LmY��B�'�� ,�9]6�T1OK�<�'��I�e�&Z&��� MIS�`6��f1%��Q���� �,:{2��S�� ��C��Ac�z�ʢ��+|�=�`�,SJ^� ؿH҇Z�hkQ1�gn�p��'˘�7W�J7���bZ�me~g�����o ]M�dbs�v�7�����[���t1F�߭�x|y��5��r�v�=�>�|���`�CX*N��Z��^xc��]�|���+y3�n� :��Z�Cr��`�g��H����Fl"��a�/GJ���Snh,7]_���Mz9�4�j �h&5�� i ?A̵��2�:@�p�mEp\$#B�l!|�Ղ�2,��`� ���wʀWj�w�1�@����!�(� o�z�@�Q�HH�E�f�DN�<`9ǥ�Wy@yW ��R��� �R�Fa�֗u�@"�4|��A�%¶�@$yiwD`NŒ�oh�n���P�zg�����HY�u�}4����@�G�� \?6C|1d������k�w����b�p̋}���*��wk� ;N/dQ��W� �A@J��5�z0 Iʶh�#�Z��F��b�%�DE��dXWWU�q�lixu�^ww��� R����Ϋ����}>��]�;�tevM����oa{�ry� JԷ�G�|7�.X62�d�谙ue� �:��pb��������4"D�B�%���{���x�|�P��p]7xU%y���D��]�i�I���Ҁ2 s2��I��Q��������!��F���e��\�2{X���n'����QJ<�4A� �E���ڔe����6z�Њ!tP�D���]�-m��eҺ��`y�U���d�i����>���@N�B�S�"� ��eR�M�F]��&���46(��A��G�f�hYR�Q�B��ԗ����-.fV��&f�ƒ`�;�6F��������$ [���!r�^K5��S�R=��($Vȡu��<`�3(����X����.� ��z�'���l,�A�D�W������xV��7 `�P��хh��-������|eu������D=��T�� � U��Qi� �?��?��I�%������W������K9|η��;�g��%?������e;���T��#v��o��g��!Tw����@��W�Pk@z����&_������{��:��ƻo���"Z��Ju^�&�>��sZ���XVF�}N}������)�����Ѹ���ΐ���?��� 鸃p ꎮ>��W���"X����c{��f�Gmm��N�v~ـ.�/�Y۶��S���w2�L5ߕx�fE�u?��5c(6���Z�4���՝����pU�?�wW����W��ߧ�?s0�}�O�~ PX���ݕ�RU[��v;+�D����$W�s��٢���+��:�]O�_~!���]c�ˮ?���}�?;y+�_�7z��1��Yt-[Y�;����HC�jJ�9�T2��������w�xU.:x���>��>����ԛ�|k���>��~X�!u���?`���q��Kv���������_8��� U�?o��t�Xu1�v~φ�Y���Y����� �����3�L��e����lW>�m����Vp��7�&!8v�Q4�-�t��c�����MO�_*}�}���>��4�����M}��!�vbV��+qi���l��e1��,M�v�О��e�����?W�7��0Tp�8�1�����3��}��?.v&G����+]�O}熓�}����Pԥ ��v�0(�+��-a� ������c�~1���LD���54E� �ۛ뉈Z�礳w�=�-g �Ue� ��ʈE�Y*зT��H�i7��|?= �;�-}��c�w{����=�L}�Y��)��#2���i����^~҄�q��o�\NAA�Z�`�����QM�e���j���n��tފ�cF�6|g9eŜe�A�(n���.z ��w��7 ��yS���1��i��~ �/�~<5g�����)�=~8�]~�}f٘ڃn�1Y��R�����w����#�wt��jò��>��?w�X(�j�FT�]�c�BS�*�{u��9�ڨl=����O��{�opvQUǷ��WE�����.�� f���kw�Xb%�#�1�F%�2�:��>���� ��~`�f������/�7b����1�p�����:˳^ �u��*�-Lw����b8�����[l�O��n�ᤜ�&���j�}/����J��Ӽ�9���V���k�PG�O䲬�y��W�.��V����b*����B���0� �u�76;H��/IS�?+��������o� ������M|B9�?��I��G���t���׮: U��]1�}b�w�ɹԅg�Ƌ����*~�� ��F��4��\�l^ R�F5EZ\��t��)8�Jr�=�/�!w6��;����D`�>�|?����ȽSk�7�Q㱅�ls�]�t�x���%����lV7)M��ٞ}��9�|b��X 4��i(E�D����� p����5o���x�8!.���1 C�����3]8}��)�|=�~!���M2��k�p:�,A�?���8�O� �ك��L�MSeQȖ�ҕ�ܴ�.����Y&ݢ��V��q3{�q�N>ޯ�epy�5�R��NW�DJ۷��{}�R�e����~p2�锋 ��R��-�q�h5G~8�p*R�FV��ogE3�U �%At���a���d�ۘ�+��"��yZ�����Z��m�=�0P�d�G��l�_�g�}�Q���b�Bއ��qpTDb�/ހm���`*�����:�y�˭�s��a��%o'��;�����.=+v=6�c��I��?�x�u<��x��?� �ul��#�_H��B��*ksP�r���U-��� �h����:�Xn��r��G��G��w��A��#�9�v���XSኼ�y��lD��5�o2φ� ��v7�LR��ַ홼�e��_�����)J���� Z����N����p����~f���U��_�i��Edp�:w���)�\�������I�R|�y�P�v[�*)fT/�zU �����#�<���zDU����l_?��D힞|�7�?��d��~�Lt����g,���^��4��t�oe��%E(�˯M����]���j�|w�4������k����7��t��=~�z���;�u,�����A i���QU�V5g������z��� ���_�^ڇ�3��oQ�x�R�&ްp+������u~ĵ�����g��_G�v{k�_O�4�_���_��Pn�_^��T|B�E�1c��+������=Y{�o���u���^ߘn ~|�M_��u.Ꮗ������w}#h{t��"Z���?�0sLp�N�5����/(���&�����';�����&�+��?Y���k����,���v]�_��<��#��f� ��9_;�5�6��`����q���&��g3ӆ�n�v�Na-Z�l����?����l�Iؖ�//���\����q��C,�0�Pn"+��3r�%�|ŽST,F�S/� �.d� �J)��r�%@Y�T6 �^+�& DA���s�X=����e�.�\�����a�l!x�M��y�=��޹�� 43�_yQv�͞7�U���w0�CP���(����W�>0������Z��Ĩ��x��TX�'����%�`eώ+�4���v��a|ʯ�����e�.��\��~�K�p��ĭCo��Z��z�K��f ���LH%3��c#�I(/H1}_��R�����Tռcu zg^{L�C}(��f�S �{�Uq Sl��Ǧ��W`�o_�51 ���~���1�y�w�n,�J��@ ����=U�-��x/���T �n��(ؖj�+�?�e�2�폜��]�GGx����Jo� *�k�0�6��,�u�1^C���5@\�>X�y�c���Ӵ8�Sd@ P�\C��wӍ�a��: ���a(���HNBʽ}��z0��&��jL�F ߏ�1 Rx �>MsTm��`����1�!;�[�^�+=_�V�1Ɖ؂��9d��~��;�+�0r��9#*��נ��Ϟ�DV�#�m<�3\K��h�.���(۷It��=o��zD-�}�=�'����qV�az���̬.��y��*�}�x�?#�G<��%�P9�F�%_ijt<'�Ye� ��t���������:��|B�Ae�j�n~�ρ�qF�W�]��:�10tZ���oG�{vn�g��МJ�������q����b������ MJ�L<r1e����>��HWt���ח� �������������_=\������(���m����"x<�w�M�/?n3�y�ߣý���G��;��ꜛ�^���� ͢4[�[]%[pq����w�X[������ۛ��i�ؖٛ�_Yx Ã�ljX.��@h�� |2�I� �fmb��tA���Cz�%^�-���mA�'RP=�.�T������%���%�P�q�ǂ���Q)���P���`�L9���#����LPQ�-��k�f�U*:�'�O&��7� 1'R�E� ��Y� A��*!���E:��r���� ��N����\��,���7-uא��ij��+D/W��-���n�ʼn*�|TC�=�SP?�/��post�UCXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate s�k�UC7���,��#�j[>Y��ntry(�{��_�����fM�TTj���,N�T�ɨ���N�url Ehttp://graphics.nytimes.com/images/membercenter/newstracker_head.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"5cbf7b5-1-3f8-3c681534"hvrsdataGIF89a��������r���XX�������~~����..�CC���Ώ��kk�@@J��% W��1��PPD��+���� ��00P]``>��SS������������c!�,����pH,�Ȥr�l:�Ш� �Z�جv��z��xL.�C�z�n���|N�����~���������������������h!���!�!��q� � i  �� !  i � � ��!��� � j��  Ƿi �i�!�м!�����!��!"@����9�B�A @��0�+A4 �i��4� ����P���� �R�[ � � @�U!�3��i �D�`CH�A�08q�o|zx�B�� H���vT�p.D�� PIW�d0��D� �Ϻ*E>dg�ZG� ��T �4�0|�<�$@�!�_�Y��=��.� �$d�@!D[ &� AB�|���mW�׀R��0�n�*���03���X��� �1@�e�I0~�]ט@�NR.��*�i ;߽ ��P=\ Yq�ї]��|�#�_H �z��D bZM'�M10R �r�F�E�H�ˡ��<�~��]��G� ?���?D�w �H�1� ��%u�NZ�RMq������K��R�]k\�FY�X��W��JXUZn���J�=���A>��X�0 �(y�ڈD�7��q��R]�<� ��Bh��T����cG���"-4T�AX!Y;�r��-nF�f%U�@�e��q�!��AJ��h��z@-$��_ T6�  {�����+���k���;postTj��XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �{��Tj���5��Ŵ�#�jN��ntry(n��9��1���)� 0�4����r��'n��O��url Hard-Drive Magic: Making Data Disappear Forever
New York Times Technology The New York Times
Home
Job Market
Real Estate
Automobiles
News
International
National
Nation Challenged
Politics
Business
Technology
- E-Business
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions

Click Here
Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Photos
College
Learning Network
Services
Archive
Classifieds
Theater Tickets
NYT Mobile
NYT Store
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Your Profile
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Newspaper
  Home Delivery
Customer Service
Electronic Edition
Media Kit
Text Version
Tips Go to Advanced Search
Search Options divide
go to Member Center Log Out
  Welcome, simsong
E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


May 2, 2002

BASICS

Hard-Drive Magic: Making Data Disappear Forever

By MATT VILLANO

THE State of Pennsylvania learned the hard way that files do not actually disappear when they are sent to the Recycle Bin on a desktop.

Earlier this year, after the state's Department of Labor and Industry sold a cache of surplus computers to local resellers, thousands of files of information about state employees were discovered still on the hard disks. A local television station, thinking the machines might still hold confidential data, had bought some and turned them over to a Harrisburg forensics company, which found the files in the nether regions of the hard drives. After the news broke, the company gave its findings to the state.

Corporations have also been caught disposing of computers that contain confidential information like tax records, financial documents and medical histories And even for home-computer users, incidents like this one raise a compelling question: How do you know when delete means delete?

The question is relevant for users who donate their old computers to charity, or just throw the dinosaurs in the trash.

To learn more about deleting data as a measure of personal security, I surveyed 10 products that enable consumers to eliminate files irretrievably. Though all the products were similarly easy to use, they varied greatly in scope, with some designed to wipe out individual files and others to "scrub" hard drives clean of everything, from tiny files to entire operating systems.


Robert L. Prince



Topics

 Alerts
Television
Gutmann, Peter
Electronic Mail
Computer Software
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters
Other Resources

Some products for erasing data from a hard drive:

BCWipe By Jetico, $29.95.

Cybercide and Cyberscrub By CyberScrub, $29.95 and $39.95, respectively.

Dataeraser By Ontrack, $29.95.

Declasfy By Mares & Company:, $75.

Eraser By Sami Tolvanen, free.

Evidence Eliminator By Robin Hood Software, $149.95.

Secureclean and Cleandrive By White Canyon Software, $46.95 and $39.95, respectively.

Washandgo By Abelsoft , $19.

Wipeclean By Symantec, $69.95 (a $20 rebate is available), as part of Norton SystemWorks.

ZDelete By Lsoft, $19.95.


Newsletters
Subscribe to Circuits
Sign up to receive a free weekly Circuits newsletter by e-mail, with technology news and tips and exclusive commentary by David Pogue, the State of the Art columnist.


U.S. v. Microsoft: The Inside Story of the Landmark Case

Buy this book for $24.95 .



To understand these products, it is helpful to know exactly what they do. Peter Gutmann, a professor of computer science at the University of Auckland in New Zealand and the man generally regarded as the "grandfather" of the elimination methodology, says the process is closer to overwriting indelibly than wiping clean. As he explained it, when a user goes to eliminate information on a drive, the utility he or she uses actually overwrites each bit of data with a single value: zero. After that, the data still exists on the drive, but because it has been permanently overwritten, it is inaccessible and, therefore, considered gone.

For many personal users, this one-time overwrite is enough to preserve security; few if any recovery tools can find these files in their entirety once this process has been run. The Defense Department, however, is a bit more cautious and has established a national security standard called 5220.22. This specification requires three separate overwrites, first with zeroes, then with ones and finally with a random character between two and nine. There are no commercial or black-market file retrieval products that have been known to retrieve a file after this process. In other words, the only way to make a file more secure would be to take your hard drive out back and set it on fire.

With that in mind, it is safe to say that the only products worth learning about are the ones that meet those Defense Department specifications. Of them, there are two general categories, wipers and scrubbers. The first category, the wipers, include those that recycle leftover bits and pieces on a drive: data that exists in the spaces between files, like Windows temporary files, swap files, ancient drafts of documents and Internet cache. All of these products operate in a Windows shell, promote basic computer hygiene and involve overwriting only the leftover fragments, leaving everything else intact. They all also offer desktop icons onto which users can drag files they want deleted permanently � a very consumer-friendly feature.

The second category, the scrubbers, consist of more heavy-duty applications, utilities that erase an entire hard drive, overwriting everything including the operating system. These applications work from bootable floppy disks and operate outside Windows or Macintosh operating systems, in DOS or UNIX environments. While the tools are designed for high-end corporate users, it is not uncommon to find consumers who use them before donating or reselling an old machine. In a sense, those scrubbing utilities enable the second owner of a computer to start from scratch.

Of the wiping products, the ones that eliminate individual strings of files, WipeInfo, by Symantec, is by far the most popular. It is found within Norton CleanSweep, a maintenance manager that is part of the Norton SystemWorks utility suite. Through a user-friendly, click-oriented interface, the tool enables users to schedule daily or weekly cleanups that permanently delete temporary directories, Internet cache and data files in a particular folder or section of the drive. If you are familiar with Norton Utilities, you will know how to use WipeInfo. I deleted more than 3,500 files from one section of my My Documents folder that I thought I had deleted years ago.

Other products, including ZDelete, by LSoft; CyberScrub, by CyberScrub LLC; BCWipe, by Jetico; and SecureClean, by White Canyon Software, offer features along the lines of WipeInfo's, although none offers the benefit of being part of a larger utility suite. Though Eraser, a program written by a Finnish developer, Sami Tolvanen, is not as graphically pleasing as some of these other tools, it is just as functional, and is available free when downloaded directly from www.tolvanen.com/eraser.

Perhaps the wiping product with the most interesting characteristics was WashAndGo2.0, a tool by Abelssoft. In addition to providing users with the option to delete temporary and unwanted files, the product includes a mechanism that flags potentially critical files and warns users when they are about to delete them, as well as an optional temporary deletion bin from which users can reclaim deleted files for 14 days until they are overwritten permanently. More experienced users might find these tools a bit superfluous, but for amateurs and first-time file-wipers, they provide a comforting cushion without compromising security too much.

I would be remiss not to mention the Evidence Eliminator, a wiping product from Robin Hood Software. Computer forensics experts say the product is specifically designed to thwart law enforcement officials investigating cases of evidence tampering and obstruction. After repeated e-mail inquiries, the company's director, Andy Churchill, declined to discuss how the product works or to explain the significance of its name.

The more heavy-duty data elimination tools, those that scrub everything off a hard drive, are generally more expensive and involve a far more complicated process. The most popular ones are probably DataEraser, by Ontrack Software, and Declasfy, by Mares & Company. Both of these products, on bootable disks (based on the old DOS computer language), work well and offer instructions that are more straightforward than those commonly found on such disks.

Of course, the cheapest data elimination tool can be found at your local hardware store for less than $5. It's called a hammer, and when applied with force to a hard drive that needs to be decommissioned, the results are foolproof.


Home | Back to Technology | Search | Help Back to Top

E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


It's easy to follow the top stories with home delivery of The New York Times newspaper. Click Here for 50% off.


Copyright 2002 The New York Times Company | Privacy Information
post�A{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate y�ƣ�A{�����i�#�i���ntry(�Pk�� ;~�Q%��Ϧ��}�ˀT����:�E�d�url Nhttp://graphics.nytimes.com/images/2001/10/02/business/dealbook_nytdirect.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"6513a757-23-303-3bb9df15"hvrsdataGIF89a64����111ccc������������������ޭ���{������s{{�!!�,64��I��8�ͻ�`(�di�h���)�$f�8���¸;���� ��B�0̐K��i�p%�I �@( {��o�CK�rXsX.�L "n6��CD g2 ��� =.u L Mqe��Cfi����?hUw=X���H� ��9 ���� �Ø/;ѵ���l{�� ��� dʖw�R қ|�f���X��� 3. Uҥ�6�-��-@�ްp `K�� \g� -m����30l�r1��8� �[�šCt�,\\�r#AD� I�W �,F+���<{��� �PB ���s��7��FŨ��#�3D��hRz"�9�9�lٍ�f�������V(PW��y9�"�l���>�@xl�x��S �f�� ���b$ R�^�tѣI#�<��m��(�<0�PF������lӍ�W�']]җo3"�UA3�}aƂꄇ�!1�@�w�]VW+����E��Z>�]uSտo���H$��},!f�w��1G ���y-�5�g �t��X�Qa5�\ �M�����,P -��(�N�HAy(ΘK��x�(��"�6J�c�B�D�����BJt!�G���E�$/e�~��`E[���QexX�Q ��(���f���JGո�c�7Г{^0_��,h2d�ơ+D; post��}�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �Pk��}����ߏ��#�jd�ntry()&�PI����6�aqc���ݲ9h�}�� ��r�url 4http://graphics7.nytimes.com/images/misc/spacer.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"300aee6c-1-2d-3b014427"hvrsdataGIF89a����!�,���X;post���XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate )&�P����Ϸ&���#�kr-�ntry(�(C�0����ry�V6�1<�z"�n�]�J��url Chttp://graphics7.nytimes.com/images/misc/pennants/shopnytstore.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a������������������������������������������������������ֺ����Ժ����Һ�к����κ�̪�˺�ɺ�Ȫ�ƪ�ź�º�™�����������������������������uu����uu����ee����ee����������UU�uu�DD�uu�ee�DD�uu�00�uuzUUy x00uuuqeepjhUUffffeeebDDb `^YSQ00NDDL00KG00DDDDD@00> >8 76000+ )& #"  ,�@��E������������������F�������F.d^OQF!gM*S^�da!��gD7�:�gXB+aF]fWO@f g����Q���Ѯ�����:8��cۜ�����a^d��Xg�FfgƖ\Nad���Ӥ%�1�������M������!�~��k��L#nj9�ŝɓ(S�\ɲ�˗0�-���R��M!�j��J�� S�1;\���� gM��4��M#O���ԓP�8����) Qcr�Ŷ�۷p��ʝK��ݻx���{W�߿� �Ɇ�;vfg�]�ŐY������v5ҳ�W����=d챦>�FHR�I֒e-M�|���;�t:Ę �l͜�H�ȃ#�����̜W�2�!D��Aߴ��-��4>�r�Υ��T�z��c��Ӭ�#�����wǷ���(��m�g��&��� �$� `p� ��b�%f��BT�IB��xW�p �q���6�ɃNX�9r��� �ha�*X2b�76�*E��@�YR:h�f�!�)[Y��PqZ%"p� ���c��Y��T�)�Vt���\��3Xt�g�N��C@08xA�>m6�`Ba�2 q�%iz�xSi�h�����Sa�@P���D0Q�)���,�X)����B��ɨ)l�U��j�k%�F[IR@�����|FPA�*e�C��'p�a � A ,B���*AT��F��T�7Щ%梛���ܩ��ڋ/���C"���X�����q_�q�$�l�%�����,���˄;post1<�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �(C�1<�����5�#�k���ntry(�伣|9z�O��t`]2\'���D�����S�o��url �l_�~^���bV+iP?zQ@����_���������Ţ����������˯����֤���֋��sqp�)������ؼ�vC0�n䛀 ���r,���% Ŷ���������������ѹ����ۆG0�������󀀀��� ���fA3����b�oP���!#"���M6�_������㗀���������  ����oN����w��걝���������������}����sRۜ|������aC�����~���YJ#���PPN�����i���-'�8)���//,�_A̐q���������ش����������6.���������������nN�������������hE���!�,;Z���"@`[�����`‡#Jt��!- �i�ȱ�Ǐ C��xb�?�D�կ�K��\�3``�̙��ż�sfM�7�a �Ò6H���/��-���g�Vˢ�N�SʓiM[Ԉ $�F�BM"S����2���#�\�2s�x�� ���t���֩S��t8��0���$r�19�Cc�j��C����{�4����2ӦL��A�t�K��� �Nխ݁n�nj�&*�€PZ1ي*S6�)[�B�a��tr����;���Cl���׀��K� k3��9X!�dK�/ �_�'~�'���G�礑�9�4�B��8� r�A�~?�$�U:]e�Yu�S���?�� �!�%iP!�0� �^�[а��P  D%!|���" ���`���A%Bbp�v� =�8PF5&���"s� �@m�X�� x@�x�"���ш��p��ፋ�Pv!AV�H(���PH��x��4��&<����l��_�#�c(��O:��8�уU�A���e������X�\` ��f�;AN3� ���}�s�w�� �B�B�,d�����B X@� уAd6 � �k� f���A �C p����f�Zp�P�A w�K��®U�Z0-� ���0l�I5���tTV����f�b `)�CL@ ðC @Ђ \����+8�NP l��b��'�L$~#� �8�@��8�.���EpvP`d�4p�c��.L� w@!�� �b��02HQW*45��A�1̐3� �9����N��؅z� `���va #CT$�G:�> ��P ):�}̏iP�*���`���@3.u�e���X� X����N8�?<�c������`�c�?��U�� v �,�� �<�,б�,X��B��Q��Y� �� H �0�>�����|0���ëIz�� x�08�2. �9PQ��c�;�A&x���Q��'8A/����9�&��9H�[4��D�'� )4�3��@E,D�������A6NH�,.��\�yc��e"A@ ����<�eыJ�E�q�]���2��&��,1Aƙ��E� �Ftш9�(P�覄(h�����l��O4� �tn�,[��,���p�� �^Ѕ�:� @o(6:}.p@:�D����XB ���%�B��������9�z}���p����+�� �%/pgP��q�@K,�� �Op�8�����`�w�8��a�w�@6�Eƀ ߡe������W�@"��)���-bo��' a��C6��?1�?�` f��U� ��kj� )���-c@�.&��_4�ZȻ�� -�ApM��'B�j��T��H� b?@��P�-� �;�F>�y.���o���Dm���?��}C�A.�� e�b�-@�츰9����8p Z�� ��� t4�h��׃?dC ��G#.0�@ /x��t  ��H?h=c��}�8��� Ah@�7,D��l�BB���]O� " ��N�=@k��p�� �{;�`�#�`���������(�|`\Ђ7�6qi� ���6=q `� p��j(4�5��-*�:fP4� /�*��F��;�s�@s�EUZ� \ PP0p���-�32�/��P�lfA�����0ef���\�����6��,NcM�:@Zbc,��Lp �, �c�p! bZ�f�_s�'�f rA� .�j����2Z[ˆ�}=�z�bR��a�5�P�� �U �� p� p=Q��~�2.m�1� �P�� ��y�5#�q�G�����'MA�/`4�WA.��;� x���`�p� �Q�I���;��_�| y���N�/p W�`��� �6�p o� �4�)p���;�p����d���P��~���� �� � ��u�� �����+��` V�0�$�D�8z@0J�� +�AʕJ��`��� ����_�D����_���_�@�����@ � f� �C�@���]�n� p@���_�0 ����;C��p;�;���y�+r���� +@�@��� )@�G� z��p��� ��oi`�ә�0 é�C��.Pyex7����x��W 7���\+�Q� ��I ��r�_I�;6� P���x� +� u% ���D�7� �� �)�?��z�� �� ����O��� �p.�� �D 0�K� df��p��I?�7� ��p W�A�y4� 0�� x� *b|p �#�6�`J� �@����4J1���l`�$� � f �T� ����9��� J��У�`���y��rp��0 #�WH���p@��f���0R>�;��ة _Pp���� f��i�+� �J ηG�� ���� �৲�� �S p�  � ��9%� >��+P���o)��;48 ���𖏰 ��`��5 r��`���_��P�*P�ư��K���� ���: H: ����?�P����`x#�>阭���<� �� ���3�� p �0 �:��� +�]0 �p5d�� |�|�,/�����0 �@@ d` ��j� /��P�` �0 gap �������� 9�9��`0�p �!��K��x��[��� ��  �c` BP >� �� W� 2��+ �{2 �T �W � ��{�������]p���W��p�h� u0��K�P<��Kt�������<���qp�q`�q�q�l �W`<�\�|��cx��p� u � ���Џ y���X'|���.�;�Ш<��о1p�p��0 ~T�5PTPK�оE��h� ~@I�8���P � ���L�,� f\�pƪ� ��� �p{p�hl�$K�{0 5� � ƈ�_�����S`���70 ���p���h �����,��`��5ȇ\)h�� �\�I� �@����C,媝�T0��ȸ��6 �� 5��|>@p�\j,�P 1rK� �C����ޠ���0L0 ,PW)� 5)�� �) {P��5���� ��k K��@�0 ��  �5�1@,0 {� � ���� �T��͝0�����<5���L�� �L@“�� yYǬ �Ph� �0 h�CP��,p���� �\� �P`�njI�H-H����� �p�L���C0�ɪ �� ���K� KP�K@�@K,��C�Ȧ|ɝ\�m׎���<�W ̉F�Ì��t�A�NqB[�*���\dQ;�/$I���'�K���4%��nC� ,���^���f|���CIKk�<�o͠��4]��(� ��M�nm=��DOIK�D���M]��*�`6���:��@a�YR!C|���}ڡ7�$�tc�7Ȩ� @-WJ v�* d]��F��uvᎋ9��v�����iwOz׍t@ �5���(΍R�cT����Ѥ�Q��#,���f�MB]g���C1�!�s�p�Yr�ɕ�@�A3�~�0Wp ��2"��?�i��1ˡ��_ؠP�1��&��ș���QDj8���.�΀��XT��( P�P�����'ep�g�ķ��`�C�!�����^r���B����`�h�fy��6�FnV+i(�q�0�y2 B6%� ���Z�qn�&�ҋ�+�K!ф(t0�/3�@�cr�A�,ڄ'8N���JT�&�=i" ��*���3R ��$���+��h�b��wPn����E���nD| E�̘h5O�`��Б�� t���&�����x��4�FU����v'֠��)N>x_L�d\��� ف��1���e��W���V�>�V�a��a��o\E��t��,X���|y"���A�j��N� JD�Q��k\���\�Pq�����c�b\oEhw�7��� ��[V�u����<>_�1A� :&��T4�>�䁅��ըӧ�aM>��#���]�1�ʈhĸ���%�UQ�8H�ԄE�'#�,n��s𵺌/�� �`��[Ԁo!���20�&P�>��c���(H�Q������`������ �ER�x }�#���m���Ь��,��ψҚf�S �i~x#�*'6�4�]��2�8� �1 ,�'F� ��z`��/}P�o<��K� 6,�~B" ��%Ǚ:a(C)�%�0�]�� �Ѷ��H)A�dsԱ�EK�@@Dy:����\�c"�Čoz���H5��2J�Qc����� �T���Ƃ�J%��@��d%8�yMW��B�n�|g��/#��R_�$�DX�(�9 DC2��/RtdP �l��Fu�d��RŠ���MD��8��ʥ�隱x���=5H "(v��Ekr8��Od�q�����:R AS����@��؉0� P b?@ YPR`�b�X�C:L���x����u1�T�ؙd�K�R][�u�����v��2�5$d.�l�jDo��MTYQx���ͬf7K�;post��B�XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate �����B��t��8�#�k ��cat pG;;���6�se|�#�b��W��nj`'ꃷ&���#�bq-� ?,b�{aw�`�&�#�b��q-6"�ej���&�#�b[�(/}��ڮ����&�ٹ#�c���l& P�����Y'p�#�cO��V�(�����Y'q�#�cN��;@?��t�f�Y'n�#�c�"�1��,N��W�����#�e�Q����~}�� E�����#�e�h��� ^G�o�����#�e����ˎ� s�+���$�#�eb!���h����k�����#�f���n�v�tCtgƸ����#�f�����9���M%��r\�#�f@�:�����fT%ѷ&���#�fQ-��&W�@$'����L�#�g���lԜ�b Q�,����c�#�g#��U[^ �W��1D�����#�gk5�u��^7�!3���c�#�g�U�M�ڝ�6���}�#�ge/���O.��7⸄��#�gp��e����Z(:��&�#�h�0��|h`�>��&�#�h$��М�^x� �CC����#�h�����|�?�V;,��&�#�iX���3w��1c���i�#�i�+�w�-�i�Xh3Z���i�#�iq ‡`���57�&�@�#�j���s�k�UC7���,��#�j[>Y���{��Tj���5��Ŵ�#�jN��n��4����`���#�j���{�f=�����B�&�S�#�j���y�ƣ�A{�����i�#�i����Pk��}����ߏ��#�jd�)&�P����Ϸ&���#�kr-��(C�1<�����5�#�k�����]2\'� �תg�#�k��������B��t��8�#�k �����aux ISURLAhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.html