.WAFL (l&(IA{nsRdntry(yƣLzA9'+A{nsRd~hurl Bhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime text/htmlhvrsdata Hard-Drive Magic: Making Data Disappear Forever
New York Times Technology The New York Times
Home
Job Market
Real Estate
Automobiles
News
International
National
Nation Challenged
Politics
Business
Technology
- E-Business
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions

Click Here
Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Photos
College
Learning Network
Services
Archive
Classifieds
Theater Tickets
NYT Mobile
NYT Store
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Your Profile
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Newspaper
  Home Delivery
Customer Service
Electronic Edition
Media Kit
Text Version
Tips Go to Advanced Search
Search Options divide
go to Member Center Log Out
  Welcome, simsong
E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


May 2, 2002

BASICS

Hard-Drive Magic: Making Data Disappear Forever

By MATT VILLANO

THE State of Pennsylvania learned the hard way that files do not actually disappear when they are sent to the Recycle Bin on a desktop.

Earlier this year, after the state's Department of Labor and Industry sold a cache of surplus computers to local resellers, thousands of files of information about state employees were discovered still on the hard disks. A local television station, thinking the machines might still hold confidential data, had bought some and turned them over to a Harrisburg forensics company, which found the files in the nether regions of the hard drives. After the news broke, the company gave its findings to the state.

Corporations have also been caught disposing of computers that contain confidential information like tax records, financial documents and medical histories And even for home-computer users, incidents like this one raise a compelling question: How do you know when delete means delete?

The question is relevant for users who donate their old computers to charity, or just throw the dinosaurs in the trash.

To learn more about deleting data as a measure of personal security, I surveyed 10 products that enable consumers to eliminate files irretrievably. Though all the products were similarly easy to use, they varied greatly in scope, with some designed to wipe out individual files and others to "scrub" hard drives clean of everything, from tiny files to entire operating systems.


Robert L. Prince



Topics

 Alerts
Television
Gutmann, Peter
Electronic Mail
Computer Software
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters
Other Resources

Some products for erasing data from a hard drive:

BCWipe By Jetico, $29.95.

Cybercide and Cyberscrub By CyberScrub, $29.95 and $39.95, respectively.

Dataeraser By Ontrack, $29.95.

Declasfy By Mares & Company:, $75.

Eraser By Sami Tolvanen, free.

Evidence Eliminator By Robin Hood Software, $149.95.

Secureclean and Cleandrive By White Canyon Software, $46.95 and $39.95, respectively.

Washandgo By Abelsoft , $19.

Wipeclean By Symantec, $69.95 (a $20 rebate is available), as part of Norton SystemWorks.

ZDelete By Lsoft, $19.95.


Newsletters
Subscribe to Circuits
Sign up to receive a free weekly Circuits newsletter by e-mail, with technology news and tips and exclusive commentary by David Pogue, the State of the Art columnist.


U.S. v. Microsoft: The Inside Story of the Landmark Case

Buy this book for $24.95 .



To understand these products, it is helpful to know exactly what they do. Peter Gutmann, a professor of computer science at the University of Auckland in New Zealand and the man generally regarded as the "grandfather" of the elimination methodology, says the process is closer to overwriting indelibly than wiping clean. As he explained it, when a user goes to eliminate information on a drive, the utility he or she uses actually overwrites each bit of data with a single value: zero. After that, the data still exists on the drive, but because it has been permanently overwritten, it is inaccessible and, therefore, considered gone.

For many personal users, this one-time overwrite is enough to preserve security; few if any recovery tools can find these files in their entirety once this process has been run. The Defense Department, however, is a bit more cautious and has established a national security standard called 5220.22. This specification requires three separate overwrites, first with zeroes, then with ones and finally with a random character between two and nine. There are no commercial or black-market file retrieval products that have been known to retrieve a file after this process. In other words, the only way to make a file more secure would be to take your hard drive out back and set it on fire.

With that in mind, it is safe to say that the only products worth learning about are the ones that meet those Defense Department specifications. Of them, there are two general categories, wipers and scrubbers. The first category, the wipers, include those that recycle leftover bits and pieces on a drive: data that exists in the spaces between files, like Windows temporary files, swap files, ancient drafts of documents and Internet cache. All of these products operate in a Windows shell, promote basic computer hygiene and involve overwriting only the leftover fragments, leaving everything else intact. They all also offer desktop icons onto which users can drag files they want deleted permanently a very consumer-friendly feature.

The second category, the scrubbers, consist of more heavy-duty applications, utilities that erase an entire hard drive, overwriting everything including the operating system. These applications work from bootable floppy disks and operate outside Windows or Macintosh operating systems, in DOS or UNIX environments. While the tools are designed for high-end corporate users, it is not uncommon to find consumers who use them before donating or reselling an old machine. In a sense, those scrubbing utilities enable the second owner of a computer to start from scratch.

Of the wiping products, the ones that eliminate individual strings of files, WipeInfo, by Symantec, is by far the most popular. It is found within Norton CleanSweep, a maintenance manager that is part of the Norton SystemWorks utility suite. Through a user-friendly, click-oriented interface, the tool enables users to schedule daily or weekly cleanups that permanently delete temporary directories, Internet cache and data files in a particular folder or section of the drive. If you are familiar with Norton Utilities, you will know how to use WipeInfo. I deleted more than 3,500 files from one section of my My Documents folder that I thought I had deleted years ago.

Other products, including ZDelete, by LSoft; CyberScrub, by CyberScrub LLC; BCWipe, by Jetico; and SecureClean, by White Canyon Software, offer features along the lines of WipeInfo's, although none offers the benefit of being part of a larger utility suite. Though Eraser, a program written by a Finnish developer, Sami Tolvanen, is not as graphically pleasing as some of these other tools, it is just as functional, and is available free when downloaded directly from www.tolvanen.com/eraser.

Perhaps the wiping product with the most interesting characteristics was WashAndGo2.0, a tool by Abelssoft. In addition to providing users with the option to delete temporary and unwanted files, the product includes a mechanism that flags potentially critical files and warns users when they are about to delete them, as well as an optional temporary deletion bin from which users can reclaim deleted files for 14 days until they are overwritten permanently. More experienced users might find these tools a bit superfluous, but for amateurs and first-time file-wipers, they provide a comforting cushion without compromising security too much.

I would be remiss not to mention the Evidence Eliminator, a wiping product from Robin Hood Software. Computer forensics experts say the product is specifically designed to thwart law enforcement officials investigating cases of evidence tampering and obstruction. After repeated e-mail inquiries, the company's director, Andy Churchill, declined to discuss how the product works or to explain the significance of its name.

The more heavy-duty data elimination tools, those that scrub everything off a hard drive, are generally more expensive and involve a far more complicated process. The most popular ones are probably DataEraser, by Ontrack Software, and Declasfy, by Mares & Company. Both of these products, on bootable disks (based on the old DOS computer language), work well and offer instructions that are more straightforward than those commonly found on such disks.

Of course, the cheapest data elimination tool can be found at your local hardware store for less than $5. It's called a hammer, and when applied with force to a hard drive that needs to be decommissioned, the results are foolproof.


Home | Back to Technology | Search | Help Back to Top

E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


Wake up to the world with home delivery of The New York Times newspaper. Click Here for 50% off.


Copyright 2002 The New York Times Company | Privacy Information
postA{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate yƣA{L_#_~ntry(pG;:Td;&9>L?M-url &http://www.nytimes.com/js/csssniff.jsbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmimeapplication/x-javascripthntt"8cf49540-1-19a-3b4db4fc"hvrsdata post;XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate pG;;6se|#bntry(W+mQnj`'cF(zXk&qurl 3http://graphics.nytimes.com/images/misc/spacer.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"300aee6c-1-2d-3b014427"hvrsdataGIF89a!,X;postnj`'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate Wnj`'ꃷ&#bq-ntry( ?,b0S-e:qij{aw4렜curl Ahttp://graphics.nytimes.com/images/article/header/technology.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"99147efa-23-2c7-3b01433d"hvrsdataGIF89aRRR'''!,X0I8ͻ `(Bap,O`8nȆ>OG,-6GsЌZ2WUM/vLV hH>VAyD.Ń\1<h[mxZj{G%YŪ%;fj7-/;p)W07@.7jV6hLvp yx5i: `s af%9C;post{awXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ?,b{aw`&#bntry(q-6">X%7ej땞5> p[url Ghttp://graphics.nytimes.com/images/article/header/NytArticleHeader.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"5a4133a6-1-702-3b014338"hvrsdataGIF89az~~~}}}|||{{{xxxwwwvvvuuutttrrrqqqpppooommmlllkkkjjjiiihhhgggfffeeedddcccbbbaaa```___^^^]]]\\\[[[ZZZYYYXXXWWWVVVUUUTTTSSSRRRQQQPPPOOONNNMMMKKKJJJIIIHHHGGGEEEDDDCCCBBBAAA@@@???>>><<<:::999888555444333222111000///...---,,,+++)))((('''&&&%%%$$$###!!!  !,z@tÅ@Mb8Ȱ@@( RtA"DHrpU\ `w@,;!("fPepq pA+ 7J l+< L.YiִqSb˷/[|,ɯ$1b*/BdP0*Q3g] e!=iiX {qc,VpZNn"M&x5v8U !%MCl N6dh#2XpG8<s u! 6h+M#&GI$]UdŐGUaY8O$CJ1"OmJ->5pmtv`UEL\@P1[CewSU*U `z!T4T80 XӌםLMj-BP1$!qE@W,LZ^.C"pTL`_ST6JGO@qhnt\RJCpu|EH:`7FT&W+-sVNXI52L3,_I3VƱFB4`4)E|;q"ۅ$1O.BȌ#F++Q1 AUd} o𺀁F}L3ⷖMu 'ƚvfNo!!~ٞ38JRQ@@ /5'Z (]^ ԏl"W5!Pu/f@ JҐ#dR']߸U,UH'H(5ӸCET(KU!`$}qK1t)iVVJ0W6ՖB94YxP,!sG^JT9IZ7UEcxM\нuGR3+Kbḫ@6r2IC&%-lbq Q~y"?-*٠GH(4L@;postejXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate q-6"ej&#b[ntry((/}I "ڮؕ4q"q^/url Ahttp://graphics.nytimes.com/images/global/global_nav/gn_home.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89abfff333֬yyyppp,b dihl[N0tmx|ׁ@,Ȥrl:Š JZP\$DH$Eo_nS+_ "AL|w` { uKtHwy{ kcwkBGwf~E ~fH|Ew wŽFz|GӪ ` "\r&zuC_ JqE+/jtF CIɓ(S+\ɲ˗! ȜI͛8sɳ@ JѣH*]:;postڮXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate (/}ڮ&ٹ#cntry(l& &PPP؟!,b@ dihl뚀0W@ `>@tg,İWI.+znӳ\gJ a;[{u}hsgprrd== WM J Q\_N I[Vq4t;M ɡ;>C W^ [L Ϝby441*ȀI9$ |1HpqX 1h 7.iH'fpU8Anar ZDliOI L`@> tgHy"1KhUDj0Din +-7lќ؏ nx}+;postPXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate l& PY'p#cOntry(V(/, qy1[w OANurl Phttp://graphics.nytimes.com/images/global/global_nav/classifieds/realestate.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"de2dc07a-1-1ec-3c3376f1"hvrsdataGIF89ab1@@@000```PPP >ppp!,b@ dihl뚀0WG, PvM_[Ě1#2=I.?znӳ\g{vu}hsgprrO=  1CLNdM   > q4t<JBI  P V WN\“ȑw5܅MT+G48`4R r_1ih]Ni1DB2+tEy2`^Tlz L-f-`›l/ EH2 M"2k+*)2B Av2Ƿ L^;postXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate V(Y'q#cNntry(;@?TcrO;͏tM"p6=url Qhttp://graphics.nytimes.com/images/global/global_nav/classifieds/automobiles.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"e00c7294-1-222-3c3376ee"hvrsdataGIF89ab1@@@000ppp ```ߟ>PPP!,b@ dihl뚀 0W̢GXPFA $ T@p@( ߘrK|n:{=u~l2w^A|~ ~twt5vjc LH J   TS  WO_aJ `  lvx1   H1ݺJWS?hO»`h@~u44 HH-Ç28Ѱ0a J 1e* @ %º-̊ѱ``ٲ#M(4.X#ϽO0hol:ШtJZجv"(#`cGwNS27.` 0xP_e| 1D0 k.~Uz?7 F> Fv_zk|p0Di3orud0k4Ox ;postNXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate 1,NW#eQntry(%.)I~}: uurl Dhttp://graphics.nytimes.com/images/global/global_nav/gn_opinion.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"d2a4e887-1-168-3cd80f01"hvrsdataGIF89ab¸yyypppfff,b@ $dihl{>s,;@yMH4ƞШtJZجvz0ǧIpq,k?~C5:ehq3@i2N~zK: 0mCpAIey.e_ @ i3 FqɑҔY8 :3di03 Y ΌA@<ǥ= *\XÇ#JHE^!;post~}XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ~} E#ehntry( Z+G5^Gع΃8url Ehttp://graphics.nytimes.com/images/global/global_nav/gn_features.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab¸yyypppfff,b@ $dihl{>Kɶ=-6禋D O3g2HG7""nw/?m;post s+XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ˎ s+$#eb!ntry(hʄUx}n/v8 @"x=ƑftJZجvzx f FvƇ`fhjdHholv 0p: snG@{ 8 ~pHoz0 60BÆ.m n J?Hs߶8  Y gkm8 l%%~hÂ_Ui遷$ElxC`^*:81K/S\jIfk8sɳϟ@;postXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate hk#fntry(nvHix',ptCtg/h}%jnurl Fhttp://graphics.nytimes.com/images/global/global_nav/gn_newspaper.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab¸yyypppfff,b@ $dihl{>ϽO0h ]#`A{8JpxL.zn`]/o=wU10}L<7wU\^pfG7vxs [ 1brwKD } 7 RKϺ7»c.G? x Q. hM1*ws(?t'HOsb@BQ(A7VG&pF),Zb|ptJjʵׯ` ;posttCtgXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate nvtCtgƸ#fntry(9 Vi)NjMSR15C@url Ahttp://graphics.nytimes.com/images/global/global_nav/profile.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89ab>>ѸNN^^## ̀ԓ弼nnܧ00,bH*\ȰA#JHŋ3jȱǏ CIɓ(S\r% @`D `@M pI`4$dF @7sD   g V) UPĢ}0iP AB@0^{<` :/`@b@06@U qQ2o&yL7!$` R<@m8ֳiѓ0koP| qp#T[ [`pD@}~`a)Dxs{v @oZp65arREDQXe?\1Ei6Y_e]`!Wp0[ۅ'N)`s?eT~v DƵW#eQ@0P@}k `OqAert2 P@`RnDt:O|g"gqY*pװc˖20`⹷ Nȓͼ󇷣[$QBسkν \8bH+#,C 22xæ$YA>5;K_i >%Z4 rЧ`V ֑â -gZcwJqgx/j# ڌv#<Eq|(B 5`S^} tqٌVؕ(J"hW~;/9i7&>)'DJU ޢFV4-\| iCӒQa=SH ϝ<5_hӪ]vpʝKݻx/xd Nd6È'B?d])I_ "cN1ђH U&ȥ†#BԺdA`ae@j]n\P:볅hgYL(i2ԣg|t*eYĺl6Y2ftdwgIOmdܲ.xd(RRL̗bWIaŬhW*(a0׍89֏@)d !;postb QXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate lԜb Q,c#g#ntry(U[^ :7ڑ>}Wm0P kurl Fhttp://graphics4.nytimes.com/images/global/global_search/tools_02.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a.!,.@ tZS;postWXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate U[^ W1D#gk5ntry(u^6$zWЩ;Ф7!6e\(23url Ehttp://graphics.nytimes.com/images/global/global_search/tools_04.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a0@@@PPPMMMpppYYY000qqq !,0@` dih: @p,1x`&h)& 0p<znox ?N$0WY^`/DFrq<>*EtEB/w/L- O .  .. yY_UZa/I/ -X_fd;t=!;post7!XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate u^7!3c#gUntry(MNcAOCXfh}-=eurl Fhttp://graphics4.nytimes.com/images/global/global_search/tools_05.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a.!,.@ ;postXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate Mڝ6}#ge/ntry(O|zV񋨴.2C]]purl Hhttp://graphics.nytimes.com/images/global/global_search/gs_submit_2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"d75a2e46-1-116-3c5f128f"hvrsdataGIF89a3VxƜOr@!,@` 0(R ϲ &;aBKH4ҐQe1x8 1XTFh9@xL+iѴznߝ~;"  } EN  m74 XdY Nn32G#~|"!;post.XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate O.7⸄#gpntry(e fޑYWq߳Z(^bJ(url Ghttp://graphics.nytimes.com/images/article/functions/emailArticle2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"9ffc5e2c-1-230-3b01431d"hvrsdataGIF89a33fjj䙙ZZMMwwAAݑȮ, dihlp,t p|N -S:P@Z btN,j-S8j<0P(D5 )sr)/ ~, p{,g/ijl(ndq.w |(4r+u/,bbo-q  u z~ )t(Ƹ ( ݱ(i`涚 q{  {ã(Ʀ C@ Pd5Z=8h,j֨s+= @`SjWM7 8b$F, 0劕1)p$fjUOkQk`47A x7F96!pX/ATzS* o JPJr`H₊ (Lt$Ȕ^װcfM۸sF" NC;postZ(XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate eZ(:&#h0ntry(|jsh`|Jl'U>?p$url Ghttp://graphics.nytimes.com/images/article/functions/printArticle2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"e9d7abd1-1-2cb-3b014322"hvrsdataGIF89af33AAMMZZjjww‘ȡЮ׻!',@pH,HȤrl:ШtJC GpiHpS6R& txNz~JpHvro}ceT{LrKMU KT$Ow!qI$ TwN̂ι $$J $  H"|kP;{rSp ASę@0@׫[ XaU:Jkfi Ơjh:-U(꨺ ŠP+zz;eű&l6F+1;postx XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate М^x CC#hntry(yƣLzA9'+A{nsRdurl Nhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.html#GlobalToolsbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime text/htmlhvrsdata Hard-Drive Magic: Making Data Disappear Forever
New York Times Technology The New York Times
Home
Job Market
Real Estate
Automobiles
News
International
National
Nation Challenged
Politics
Business
Technology
- E-Business
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions

Click Here
Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Photos
College
Learning Network
Services
Archive
Classifieds
Theater Tickets
NYT Mobile
NYT Store
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Your Profile
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Newspaper
  Home Delivery
Customer Service
Electronic Edition
Media Kit
Text Version
Tips Go to Advanced Search
Search Options divide
go to Member Center Log Out
  Welcome, simsong
E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


May 2, 2002

BASICS

Hard-Drive Magic: Making Data Disappear Forever

By MATT VILLANO

THE State of Pennsylvania learned the hard way that files do not actually disappear when they are sent to the Recycle Bin on a desktop.

Earlier this year, after the state's Department of Labor and Industry sold a cache of surplus computers to local resellers, thousands of files of information about state employees were discovered still on the hard disks. A local television station, thinking the machines might still hold confidential data, had bought some and turned them over to a Harrisburg forensics company, which found the files in the nether regions of the hard drives. After the news broke, the company gave its findings to the state.

Corporations have also been caught disposing of computers that contain confidential information like tax records, financial documents and medical histories And even for home-computer users, incidents like this one raise a compelling question: How do you know when delete means delete?

The question is relevant for users who donate their old computers to charity, or just throw the dinosaurs in the trash.

To learn more about deleting data as a measure of personal security, I surveyed 10 products that enable consumers to eliminate files irretrievably. Though all the products were similarly easy to use, they varied greatly in scope, with some designed to wipe out individual files and others to "scrub" hard drives clean of everything, from tiny files to entire operating systems.


Robert L. Prince



Topics

 Alerts
Television
Gutmann, Peter
Electronic Mail
Computer Software
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters
Other Resources

Some products for erasing data from a hard drive:

BCWipe By Jetico, $29.95.

Cybercide and Cyberscrub By CyberScrub, $29.95 and $39.95, respectively.

Dataeraser By Ontrack, $29.95.

Declasfy By Mares & Company:, $75.

Eraser By Sami Tolvanen, free.

Evidence Eliminator By Robin Hood Software, $149.95.

Secureclean and Cleandrive By White Canyon Software, $46.95 and $39.95, respectively.

Washandgo By Abelsoft , $19.

Wipeclean By Symantec, $69.95 (a $20 rebate is available), as part of Norton SystemWorks.

ZDelete By Lsoft, $19.95.


Newsletters
Subscribe to Circuits
Sign up to receive a free weekly Circuits newsletter by e-mail, with technology news and tips and exclusive commentary by David Pogue, the State of the Art columnist.


U.S. v. Microsoft: The Inside Story of the Landmark Case

Buy this book for $24.95 .



To understand these products, it is helpful to know exactly what they do. Peter Gutmann, a professor of computer science at the University of Auckland in New Zealand and the man generally regarded as the "grandfather" of the elimination methodology, says the process is closer to overwriting indelibly than wiping clean. As he explained it, when a user goes to eliminate information on a drive, the utility he or she uses actually overwrites each bit of data with a single value: zero. After that, the data still exists on the drive, but because it has been permanently overwritten, it is inaccessible and, therefore, considered gone.

For many personal users, this one-time overwrite is enough to preserve security; few if any recovery tools can find these files in their entirety once this process has been run. The Defense Department, however, is a bit more cautious and has established a national security standard called 5220.22. This specification requires three separate overwrites, first with zeroes, then with ones and finally with a random character between two and nine. There are no commercial or black-market file retrieval products that have been known to retrieve a file after this process. In other words, the only way to make a file more secure would be to take your hard drive out back and set it on fire.

With that in mind, it is safe to say that the only products worth learning about are the ones that meet those Defense Department specifications. Of them, there are two general categories, wipers and scrubbers. The first category, the wipers, include those that recycle leftover bits and pieces on a drive: data that exists in the spaces between files, like Windows temporary files, swap files, ancient drafts of documents and Internet cache. All of these products operate in a Windows shell, promote basic computer hygiene and involve overwriting only the leftover fragments, leaving everything else intact. They all also offer desktop icons onto which users can drag files they want deleted permanently a very consumer-friendly feature.

The second category, the scrubbers, consist of more heavy-duty applications, utilities that erase an entire hard drive, overwriting everything including the operating system. These applications work from bootable floppy disks and operate outside Windows or Macintosh operating systems, in DOS or UNIX environments. While the tools are designed for high-end corporate users, it is not uncommon to find consumers who use them before donating or reselling an old machine. In a sense, those scrubbing utilities enable the second owner of a computer to start from scratch.

Of the wiping products, the ones that eliminate individual strings of files, WipeInfo, by Symantec, is by far the most popular. It is found within Norton CleanSweep, a maintenance manager that is part of the Norton SystemWorks utility suite. Through a user-friendly, click-oriented interface, the tool enables users to schedule daily or weekly cleanups that permanently delete temporary directories, Internet cache and data files in a particular folder or section of the drive. If you are familiar with Norton Utilities, you will know how to use WipeInfo. I deleted more than 3,500 files from one section of my My Documents folder that I thought I had deleted years ago.

Other products, including ZDelete, by LSoft; CyberScrub, by CyberScrub LLC; BCWipe, by Jetico; and SecureClean, by White Canyon Software, offer features along the lines of WipeInfo's, although none offers the benefit of being part of a larger utility suite. Though Eraser, a program written by a Finnish developer, Sami Tolvanen, is not as graphically pleasing as some of these other tools, it is just as functional, and is available free when downloaded directly from www.tolvanen.com/eraser.

Perhaps the wiping product with the most interesting characteristics was WashAndGo2.0, a tool by Abelssoft. In addition to providing users with the option to delete temporary and unwanted files, the product includes a mechanism that flags potentially critical files and warns users when they are about to delete them, as well as an optional temporary deletion bin from which users can reclaim deleted files for 14 days until they are overwritten permanently. More experienced users might find these tools a bit superfluous, but for amateurs and first-time file-wipers, they provide a comforting cushion without compromising security too much.

I would be remiss not to mention the Evidence Eliminator, a wiping product from Robin Hood Software. Computer forensics experts say the product is specifically designed to thwart law enforcement officials investigating cases of evidence tampering and obstruction. After repeated e-mail inquiries, the company's director, Andy Churchill, declined to discuss how the product works or to explain the significance of its name.

The more heavy-duty data elimination tools, those that scrub everything off a hard drive, are generally more expensive and involve a far more complicated process. The most popular ones are probably DataEraser, by Ontrack Software, and Declasfy, by Mares & Company. Both of these products, on bootable disks (based on the old DOS computer language), work well and offer instructions that are more straightforward than those commonly found on such disks.

Of course, the cheapest data elimination tool can be found at your local hardware store for less than $5. It's called a hammer, and when applied with force to a hard drive that needs to be decommissioned, the results are foolproof.


Home | Back to Technology | Search | Help Back to Top

E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


Start the day informed with home delivery of The New York Times newspaper. Click Here for 50% off.


Copyright 2002 The New York Times Company | Privacy Information
postA{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate yƣA{HUg#gntry(|{U#ع?V;DpLu6s/=9Xurl Fhttp://graphics.nytimes.com/images/article/functions/mostEmailed2.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"e87a3f34-1-300-3b01431d"hvrsdataGIF89af33AAMMZZjjww‘ȡЮ׻!$,pH,Ȥrl:ШtJZ҂vrx( !O' 6Lۓ`swcy~TyBB ME  GJEFBE vCH IIEFIØ   ү rpݮu((4* Y@! pPꗫ{PBjU M8 HJ4S"D/;Z "L$" 8ʸ(BLU²\cO[cx&u[ JlOe postiXhXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate w-iXh3Zi#iq ntry(‡`W42I,,XM>0\3Rurl 1http://graphics.nytimes.com/images/dropcap/t.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89a!スքBB!!!,!@t0IA9`]izH,-ztڱ/ nnif/W4~V!5AF/ה3-@9@ >f}XdWDI[~d&;postXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate ‡`57&@#jntry(sk3BD8UCJ!1>#[>url Jhttp://graphics.nytimes.com/images/2002/05/02/technology/02basi.184.1.jpgbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/jpeghntt"6b2a98ac-35-59df-3cd07c35"hvrsdataJFIFddDuckyF&Adobed %3:Y     10!"2@A#34$PD%  !1AQa"2qBR#br т3Scs0C$@4DT⃓t%5!@ 01QAa"`pPqR!1AQaq 0@P u"VG3l|$ u}ʓ_ѦoIս{3>e31qJݤLWm[jf{Rx|GN&Q%fYj̅ϥ&gãv^t /m*Bl3ь>FռJ045 !EZ mJ^24ubc{UڜVf^ s1d cC*=Ƶ5; uXeeQŎL7뵅X0w==uu63Ͳ\SN-VeBfynT L}UْgZEM)2/"IQ0zTީ9miҵczhWrwY0]xjsgj ɥ$Vt %s ġj^Aޞ;ޖ%j15)^[,WFZKR.Iۚ~9ocSFˤ:9K>E^E £wY2DbkT׶d[] nӻQ-kB˅nn6޲Vuϻu"zߟ Ǫ?R҂ϵoN=1\UwKbeQ5HSSŧ_}@럦zc֍aYggU\wa3jiim&Iٸ/C瓵 ?;SA g"0'bx{ЖgAm螔ľo͝vϐ\q;n."a󽹠TDyZ<'J|nϥ\5ء%--o=[:t_6>B-#OKc)˵jQ7ћu!G-VXRn-K 0حMgQr2X'jU,28ˍ QMs5+qX{o6~I>c] PkiZI ;qv 6r)(W'Bϧ0Z`pw _O $O{d_qhQH⨿rda{>ollB֖)f,Y쎥6ݞ9nG[c&F4>n`P/\,`(ui{uk2삿;jKΕA$q_YV]AZQ^LQ5:ňE}qLbAs:7Ik!e6\CǎRfn.Ȧ}wx󚖭_nNYcJuM{9 F`㮩.6(F?{s9y7nS0dX,FzgQ9x_[3aAVdPsq7Nơޱ3^r/o9h(5rJ6g}uJ؅֡89 ynk<"f9wDmJ jbw֭?e*T B&IS5G\J-6̗yQ_mH)&nDD7;UNa@F]aO,QӵHdzk%-CYicҵ[=BJR5iQc̆=i \6Rc5kx[[*4 ۑb_3 tZqp]tn>\GnrJիel:v  +T7+*°VŴ-l[Bа j-i[:e{鐷,낶gnYi^2 J/=D#+Ķ#;6硿s#Z|-ruLŸ-E°B.αj:yv/rh ~Z>⎁wA4&<-j>Ѫ3@RۓN${Jnx/mOC'Jl}A #THI vֹ;˘A[H~տsT]:/|]D)byMb+avq:wEWhur -ZPE%a 12 P\Zi4YWċ#//ʈa_ScZ*%hk^ֱђ}C;t;vJsg8U۰.XDzXpHCWvk\Z|.z ^Y( pGCtjc-,, =q>OiM[{ǠNK{B즳)ТӨ:~oV7.aN t4(Ցa)@hNzPt"4- %tD-mXӷI(D;{-g$}0tΞ1z0D;O#@D ({sι[啞;Eg޲JضV„h#-[@[WxPtI٨j^2amgMXX:L]ucLh;;tBBˣ#VzR;Dr"(n2أyj˻ SQpj/RD _GS4 (ph6a@ f(D&'KJ͒?//St,ѱbE3J,6?KhQzJgli*,G]BzJgdXA]KT}t)яo0GezeeoX' OA.鞈zgKIX(uq(7H1cP2zޜ~ ?QC% E xi|)I49FR{(D ~*9qn:XM!Q% }t !=>ԕP>a})c[-u:6EXu7[B\cm,:DIH(=/P:O!RDۘ}o{ېtm#vGj*'LCbj_P#?fJJ hT@Dr=ReQ?ɨptȤ lލͷd3;EXDPX8ٵ֗D˷>tRLSe^ _(?Rz+T'.mGwFe%?gX@ bUB45g:^=F3LwXcUtF5L=8zT#ܽƒ:qFSЈhB~H]W1UWO;ڴ!SKX)JqשK~DwqqJa9Q҄%HFm器} |Myej?Zq$ #2lFċɺ0%PS8?KCP;ʲ٧B[8MoK2FP$ìƃĭUģZuUp쓣YAC3B3L#)ۛyKt )vj;'M]ϸìdڣ\ vApƢ1U!>V E%]8Sgx`gd|:"V&/tA%>(fasIKlxJqIG#5[ZM]QcM:}ZaM!N\QVv'Anhµ|k[`5$,B,)?SQGL4)F5+hq]{Yr%$8ÉFBB11Y},݋UP5Dn+N!+y8VM 0ܓ : •N=)m:7<+j9$}~\#m<x3h1=㤧xxU;2^9cYY+;N[Ȕ 1[)aya-+BIm*UZyR,#zJw_CifIJVR:4NҴ/T8)*rRg ^cP}!(m*lOb3L\ 6W)j+4<:tƫU g>RGHʪ0g+/IK o[`0[A *5|+ )7mވQ7Fu)F;j 7!nNk)F4mBh@y[FmVt{, V*+w|o1~5?J#<5+@HP=n,5 CbLdm847$[S-7{,:jLv]'tCk>dBARyU/\H9`?smL,?;7LZ HBlB &<lU y6 ET#2Kq,WLW-nm⤻uXsl$-:M¦qk!dJ9MTaSI7VN$ 7$Lxo.Dr<1_}WpFN)rͯ?1zy [5dr+ kcGt%і .|ڧ_ **QV?6ԡնX~X׷,80$oL♾TwH3*Q(yhi6 i0~tI*#Qf=Tzp %#XѸHII6!KM!%#@^9Vn4'{yx?GP=DvG;`U H2/ǞTuPft xjs_,=@vU5[IHYcVh [άWP grDo\F~r'Σ4~ML1mE9& &wZeaXtys\PτКoEJ>Y1?!A):4SںMؔoRc D,Z 227%}-qg7L0%-p㙉Hy6d7r|,)T *T*u"`l$/ԟG+TCAnۛ,-qjf {F'z9al"o:aNKj#.x5djF7)؝>A`xfⰔLi3>;&*{l5> e'Boacm!!PWX@H[dO7A7 It$i3vwm UhI 2{zfYZa % %OT+\qSJ˄v/T%Rz@SnBrΜl!i^IvF(+?vr# xmZĀHL7㝐ws𔛌a<Z916dRMPrO$nˀ(R•1v'%br@SR3 ,G,'(R@'B}f|]j(d̝. J\Dm$OL z T'zʈ,>vS͢Jqv  ӎ8l7a(!%R +۲%|+4:jHH}nUژ&g-gT\J]l05`:H;NivdտGڜ%$t^ѱ0]x%)WO*/ֿaY'ɒfZgO؜y'jZpuq$!NRp:E'#rSep%lT2Klv6@ZPf3kō`[D\S0;*&31"F!U *כ=8/J~qB~sK4f[ͥ#F Noi+kqM֭C,cBڸVENcvR3=IF-`Kc HNk,`DJ ֵRFI!Mo? W|J@]Ni9c7vF Bmq{ZS脩ZPo0-y;|6L_*ÇU?6<4d<5Z;Y h]0g+9&W4!~YnJ~(tWdg f`N,.8+=DgW2`"X[m; '9c^f,\]8*aThN"ɒqNR-U RRm9-Bv[lql.i⸃ֺONVhF2}"J# BvOe,o`'"hvNM`Ѩp/fJ D<*m -JRl˵ a ~X)'XgUG`֮9#7_a¨<}u#h.Vgz`4F76}Θܖ:ZWƪ/?!@8oh?zioWK6t]Ӗ:IҚ3=fW,Q~)}tlcawCKOt_.͖*kU DͶiPh6TxަMysSW< X,߻ܹu6WD[TD z_=}=t'ܱ宯- 0It28K5Bs_Ym9 fAhπH):; !&zmlN[VUúGEy*5in=ɯң_$zfCP&2G5SIv͑Ws gYC'AƻMK?/dphMqPUxjfbަm׾%օ历m%!XP#@JwtQN>/ˈ#]EjW8s0f+qgQxRr kǑÓXs7dlXUx_#zy830nYJCljiWQ~i)2.(VG.F{~9u4Nh~s)[~yǴ.7D9ܠil\9Q|2ccʌJ}QV )nf 9u`nre%~sŒ n`499$k741uMjN" gIlT<u ]"~&Ul`/ } 1s(]c}ny\(p<@; +)i(J||(j c7ɒ%} ģI$-VV8֧AK:N6е+~Va1W126AF,Qbyɞxe{=k 'd앾X>fq A:&6Fbhl7>y}l=\]S&K>,vp)lAe͖rԕ"'mԩxꃺmueuaBdQ`ջbO_2pwuW,@Err}ft+xim:{'e\am;Iڄ&n yKp{dY5i["] 2'R<=>iy@S\#RP; JNg Sy[¼wfT&hzNˣ*ditS?>=ΐw߇fO?/%&kM51 L WX퀄[)_`0.9P?y`]`zYoXo`F+SgD,9~醶FiƢwpu /3=j^s1VŔ\4dJ keJa`vz%M!BReBm.uR03fvCj}o6o`*q+hw7n4Kx.^Z 4c]q!.MH}e{,!im-%p7*ϣ~IyN ս__"1cxԏcOj[FN]{Y22k%S  vSSIљC:Q&u&R+>.7PA''0 d%b8حOH 3""3Ļ6˩)e o9Iv3H^?/'Lp zijKO@VT zޓ єg-߬P]&/- 26D2+H1tp)ϴhu[pA(PħS??RRvzhxSUJaLŃ^_bkkRnw44mjp|]2@a2jټRQVh.h7if:]yka3s9yg =㶜iTh[=bP[{wʢ'2g ]J \%<2Y?XP^2_ Zpv@f4Z'.3O#mJo@o,GNS(KWvw?C#C;>zq0U ЊNsjNcb՛`i5y3"qH5*eZ: H0l3j /So' j}R(l]d2V aw?F4z%m6moGTe ^:7ٓ-YNAZ#bqq{;OKYqTm1/n-a/=1[Z-o(D ް0[ƾqm?1BRO'/h!¢u˯+tc1*mz?8yE`4yT+ꄮp~%$+\`_| ?!zb'=YژqO+|=& iѽρb:Dj4Ƽn^Ļxm C/-GKi"B|FWIw3IV|NDgMf.ܱ[z  O8i\9 o6Cnǭ2ߨ9E/zOaϧ1冑gv{8<>Ge܎ F`\[e | U찾X3xE rJn0o-cOSƏ@t0^3PO?WB񫕾˟h <;3_SY?ٙ#MAvKVgڛ # Hgwo>{sPOO~ *wLp̠^gm|~ɷH>z?M t%T54'8E/byu8=\_'u0Vhez,~:}Bi_?OLeLg=KV;W1=yv{ds\"iߟΜOӷSjfieQ5ǀ)hjzeJۇ%)6]BVF=:8<V@l}!ٚ81%CvϤ s8ؕ !Ҽ0aL?'RmD EqTJG]]gVcG_U  F8 TU[# Fӟ ??{Ex5Ne`۞yKVpc7,~pQT+^ _l?0)N>{\<R9-KOCX%A,ōK':ږ1?!+TY^~=G_-Jon'uJq14fg  <} F #,ixOP! &̫XDe0FoGPf> K(@#IrNpo~x*gxnk[Q dXrmP?mm#Au)WVW7Id=VJja*4VB9~*zk}&Y@{%(FdQyB;}X\2OmgkC"fY G~I>)`)vU̷M*٥ sYV ?P*L&5/R!a1Zv 2Bu5ĢPrr6Y=6Yx>8Rd3R#g$OȟAK9Kx%bXDlI:2W.=BLMiؐ4P;K`Ӓߜ`1\-`pަz3<(>+%*%3@ڢrm#Bd\̩ml񻃒-.#A WX)fEb<=S[ݍ>9[ ˮL[+,Q f81w: ]4;ap,J8H`k-/}: "-f0SWƤ 3vQ`Ɨ4ڐG/*='RPbT"JMFʜ_u,Ydd_ N` -2+6lUj@RP l)AWHK6Тm#W!-,Ֆ&/OH&RԤ+JY{ TMt7p(,{eŗ#%=cmuoc ]eEվZl i8dk E_+0YssV9 8A]?@.uNCϹ.[;X{v%ǿ#PQ/j4GUS@F,'*ъf{\s]V lɷYsBQC(YY.+³ BŃlMdSZedc"k}`2 M7aKJD`cfZB0^ooW%;o> TOʳ@6g  Á%·m%R\XC AjߣTwMzEPPJFbh (^!-Rut 5Wi0-謃W|?x/.cAQO<"r`r ]475a5=BL;T.]cRݛ 8ʍ]p6 p$ ̧0t q.F訲6Xѭ-κty;gw?z)@ T/,-1%pVHCmm(*-Bun>@)Zm,Όl$&acLN:ޙ,ER"nӡoIv&l6OpzATJk3s* bqh1Bf| gEL˪*:"jp`X C`:{fxNgprz_W) 7Xv\r5\Lкr*̛Zj\K {a0QR'Y+V,50(%A4A>'R2Y\^~ ^0Z) ;qeѪRe}3iAD^};FgڐdyΖq)N/o*ōۄ'rJJFFϒ2K\|`ݧ#eoeks521O[ʬ`j 6] eEj\i SҳWRh7n;Lv|n hE+ѹKRVk`& 72(6,X*\*5l(l\D@M5!tT&^usAy,--m`pQ~OqY03WDKy-!|0şW}ΆhvtY1}" Z& IcZ 8͢ZKtB [+*2AT6enbhƔ]V /[bMJV"&D* %1 ]08"'"#~χٿ3ϕ䀝 R( f j̍ /5VE%K<_ %4T NKjŐ [&CE d.uv9}X,}R;-"0t=uxpuNNsn83)K#ߗ_$%hkugDɗ@ZN~$*>-'B:XqɁ zv,ۯBmYx-. Vxd*hN9LmYB' ,9]6T1OK<'Ie&Z& MIS`6f1%Q ,:{2S CAczʢ+|=`,SJ^ ؿH҇ZhkQ1gnp'˘7WJ7bZme~go ]Mdbsv7[t1F߭x|y5rv=>|`CX*NZ^xc]|+y3n :ZCr`gHFl"a/GJSnh,7]_Mz94j h&5 i ?A̵2:@pmEp\$#Bl!|Ղ2,` wʀWjw1@!( oz@QHHEfDN<`9ǥWy@yW R RFa֗u@"4|A%¶@$yiwD`NŒohnPzgHYu}4@G \?6C|1dkwbp̋}*wk ;N/dQW A@J5z0 Iʶh#ZFb%DEdXWWUqlixu^ww RΫ}>];tevMoa{ry JԷG|7.X62d谙ue :pb4"DB%{x|Pp]7xU%yD]iIҀ2 s2IQ!Fe\2{Xn'QJ<4A Eڔe6zЊ!tPD]-meҺ`yUdi>@NBS" eRMF]&46(AGfhYRQBԗ-.fV&fƒ`;6F$ [!r^K5SR=($Vȡu<`3(X. z'l,ADWxV7 `Pхh-|euD=T UQi ??I%WK9|η;g%?e;T#vog!Tw@WPk@z&_{:ƻo"ZJu^&>sZXVF}N})Ѹΐ? 鸃p ꎮ>W"Xc{fGmmNv~ـ./Y۶Sw2L5ߕxfEu?5c(6Z4՝pU?wWWߧ?s0}O~ PXݕRU[v;+D$Ws٢+:]O_~!]cˮ?}?;y+_7z1Yt-[Y;HCjJ9T2wxU.:x>>ԛ|k>~X!u?`qKv_8 U?otXu1v~φYY 3LelW>mVp7&!8vQ4-tcMO_*}}>4M}!vbV+qile1,MvОe?W70Tp813}?.v&G+]O}熓}Pԥ v0(+-a c~1LD54E ۛ뉈Z礳w=-g Ue ʈEY*зTHi7|?= ;-}cw{=L}Y)#2i^~҄qo\NAAZ`QMejntފcF6|g9eŜeA(n.z w7 yS1i~ /~<5g)=~8]~}f٘ڃn1YRw#wtjò>?wX(jFT]cBS*{u9ڨl=O{opvQUǷWE. fkwXb%#1F%2:> ~`f/7b1p:˳^ u*-Lwb8[lOnᤜ&j}/JӼ9VkPGO䲬yW.Vb*B0 u76;H/IS?+o M|B9?IGt׮: U]1}bwɹԅgƋ*~ F4\l^ RF5EZ\t)8Jr=/!w6;D`>|?ȽSk7Q㱅ls]tx%lV7)Mٞ}9|bX 4i(ED p5ox8!.1 C3]8})|=~!M2kp:,A?8O كLMSeQȖҕܴ.Y&ݢVq3{qN>ޯepy5RNWDJ۷{}Re~p2锋 R-qh5G~8p*RFVogE3U %Atadۘ+"yZZm=0PdGl_g}QbBއqpTDb/ހm`*:y˭sa%o';.=+v=6cI?xu0ZĨxTX'%`eώ+4va|ʯe.\~KpĭCoZzKf LH%3c#I(/H1}_RTռcu zg^{LC}(fS {Uq SlǦW`o_51 ~1ywn,J@ =U-x/T n(ؖj+?e2폜]GGxJo *k06,u1^C5@\>XycӴ8Sd@ P\CwӍa: a(HNBʽ}z0&jLF ߏ1 Rx >MsTm`1!;[^+=_V1Ɖ؂9d~;+0r9#*נϞDV#m<3\Kh.(۷It=ozD-}='qVaz̬.y*}x?#G<%P9F%_ijt<'Ye t:|BAejn~ρqFW]:10tZoG{vngМJqb MJL<r1e>HWtח _=\(m"x<wM/?n3yߣýG;ꜛ^ ͢4[[]%[pqwX[ۛiؖٛ_Yx ÃljX.@h |2I fmbtACz%^-mA'RP=.T%%PqǂQ)P`L9#LPQ-kfU*:'O&7 1'RE Y A*!E:r N\,7-uאij+D/W-nʼn*|TC=SP?/postUCXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate skUC7,#j[>Yntry({_fMTTj,NTɨNurl Ehttp://graphics.nytimes.com/images/membercenter/newstracker_head.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"5cbf7b5-1-3f8-3c681534"hvrsdataGIF89arXX~~..CCΏkk@@J% W1PPD+ 00P]``>SSc!,pH,Ȥrl:Ш ZجvzxL.Czn|N~h!!!q  i  !  i  !  j  Ƿi i!м!!!"@9BA @0+A4 i4 P R[  @U!3i D`CHA08qo|zxB HvTp.D PIWd0D Ϻ*E>dgZG T 40|<$@!_Y=. $d@!D[ & AB|mW׀R0n*03X 1@eI0~]ט@NR.*i ;߽ P=\ Yqї]|#_H zD bZM'M10R rFEHˡ<~]G ??Dw H1 %uNZRMqKR]k\FYXWJXUZnJ=A>X0 (yڈD7qR]< BhTcG"-4TAX!Y;r-nFf%U@eq!AJhz@-$_ T6  {+k;postTjXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate {Tj5Ŵ#jNntry(n91) 04r'nOurl Hard-Drive Magic: Making Data Disappear Forever
New York Times Technology The New York Times
Home
Job Market
Real Estate
Automobiles
News
International
National
Nation Challenged
Politics
Business
Technology
- E-Business
- Circuits
- Columns
Science
Health
Sports
New York Region
Education
Weather
Obituaries
NYT Front Page
Corrections
Opinion
Editorials/Op-Ed
Readers' Opinions

Click Here
Features
Arts
Books
Movies
Travel
Dining & Wine
Home & Garden
Fashion & Style
New York Today
Crossword/Games
Cartoons
Magazine
Week in Review
Photos
College
Learning Network
Services
Archive
Classifieds
Theater Tickets
NYT Mobile
NYT Store
E-Cards & More
About NYTDigital
Jobs at NYTDigital
Online Media Kit
Our Advertisers
Your Profile
Your Profile
E-Mail Preferences
News Tracker
Premium Account
Site Help
Newspaper
  Home Delivery
Customer Service
Electronic Edition
Media Kit
Text Version
Tips Go to Advanced Search
Search Options divide
go to Member Center Log Out
  Welcome, simsong
E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


May 2, 2002

BASICS

Hard-Drive Magic: Making Data Disappear Forever

By MATT VILLANO

THE State of Pennsylvania learned the hard way that files do not actually disappear when they are sent to the Recycle Bin on a desktop.

Earlier this year, after the state's Department of Labor and Industry sold a cache of surplus computers to local resellers, thousands of files of information about state employees were discovered still on the hard disks. A local television station, thinking the machines might still hold confidential data, had bought some and turned them over to a Harrisburg forensics company, which found the files in the nether regions of the hard drives. After the news broke, the company gave its findings to the state.

Corporations have also been caught disposing of computers that contain confidential information like tax records, financial documents and medical histories And even for home-computer users, incidents like this one raise a compelling question: How do you know when delete means delete?

The question is relevant for users who donate their old computers to charity, or just throw the dinosaurs in the trash.

To learn more about deleting data as a measure of personal security, I surveyed 10 products that enable consumers to eliminate files irretrievably. Though all the products were similarly easy to use, they varied greatly in scope, with some designed to wipe out individual files and others to "scrub" hard drives clean of everything, from tiny files to entire operating systems.


Robert L. Prince



Topics

 Alerts
Television
Gutmann, Peter
Electronic Mail
Computer Software
Create Your Own | Manage Alerts
Take a Tour
Sign Up for Newsletters
Other Resources

Some products for erasing data from a hard drive:

BCWipe By Jetico, $29.95.

Cybercide and Cyberscrub By CyberScrub, $29.95 and $39.95, respectively.

Dataeraser By Ontrack, $29.95.

Declasfy By Mares & Company:, $75.

Eraser By Sami Tolvanen, free.

Evidence Eliminator By Robin Hood Software, $149.95.

Secureclean and Cleandrive By White Canyon Software, $46.95 and $39.95, respectively.

Washandgo By Abelsoft , $19.

Wipeclean By Symantec, $69.95 (a $20 rebate is available), as part of Norton SystemWorks.

ZDelete By Lsoft, $19.95.


Newsletters
Subscribe to Circuits
Sign up to receive a free weekly Circuits newsletter by e-mail, with technology news and tips and exclusive commentary by David Pogue, the State of the Art columnist.


U.S. v. Microsoft: The Inside Story of the Landmark Case

Buy this book for $24.95 .



To understand these products, it is helpful to know exactly what they do. Peter Gutmann, a professor of computer science at the University of Auckland in New Zealand and the man generally regarded as the "grandfather" of the elimination methodology, says the process is closer to overwriting indelibly than wiping clean. As he explained it, when a user goes to eliminate information on a drive, the utility he or she uses actually overwrites each bit of data with a single value: zero. After that, the data still exists on the drive, but because it has been permanently overwritten, it is inaccessible and, therefore, considered gone.

For many personal users, this one-time overwrite is enough to preserve security; few if any recovery tools can find these files in their entirety once this process has been run. The Defense Department, however, is a bit more cautious and has established a national security standard called 5220.22. This specification requires three separate overwrites, first with zeroes, then with ones and finally with a random character between two and nine. There are no commercial or black-market file retrieval products that have been known to retrieve a file after this process. In other words, the only way to make a file more secure would be to take your hard drive out back and set it on fire.

With that in mind, it is safe to say that the only products worth learning about are the ones that meet those Defense Department specifications. Of them, there are two general categories, wipers and scrubbers. The first category, the wipers, include those that recycle leftover bits and pieces on a drive: data that exists in the spaces between files, like Windows temporary files, swap files, ancient drafts of documents and Internet cache. All of these products operate in a Windows shell, promote basic computer hygiene and involve overwriting only the leftover fragments, leaving everything else intact. They all also offer desktop icons onto which users can drag files they want deleted permanently a very consumer-friendly feature.

The second category, the scrubbers, consist of more heavy-duty applications, utilities that erase an entire hard drive, overwriting everything including the operating system. These applications work from bootable floppy disks and operate outside Windows or Macintosh operating systems, in DOS or UNIX environments. While the tools are designed for high-end corporate users, it is not uncommon to find consumers who use them before donating or reselling an old machine. In a sense, those scrubbing utilities enable the second owner of a computer to start from scratch.

Of the wiping products, the ones that eliminate individual strings of files, WipeInfo, by Symantec, is by far the most popular. It is found within Norton CleanSweep, a maintenance manager that is part of the Norton SystemWorks utility suite. Through a user-friendly, click-oriented interface, the tool enables users to schedule daily or weekly cleanups that permanently delete temporary directories, Internet cache and data files in a particular folder or section of the drive. If you are familiar with Norton Utilities, you will know how to use WipeInfo. I deleted more than 3,500 files from one section of my My Documents folder that I thought I had deleted years ago.

Other products, including ZDelete, by LSoft; CyberScrub, by CyberScrub LLC; BCWipe, by Jetico; and SecureClean, by White Canyon Software, offer features along the lines of WipeInfo's, although none offers the benefit of being part of a larger utility suite. Though Eraser, a program written by a Finnish developer, Sami Tolvanen, is not as graphically pleasing as some of these other tools, it is just as functional, and is available free when downloaded directly from www.tolvanen.com/eraser.

Perhaps the wiping product with the most interesting characteristics was WashAndGo2.0, a tool by Abelssoft. In addition to providing users with the option to delete temporary and unwanted files, the product includes a mechanism that flags potentially critical files and warns users when they are about to delete them, as well as an optional temporary deletion bin from which users can reclaim deleted files for 14 days until they are overwritten permanently. More experienced users might find these tools a bit superfluous, but for amateurs and first-time file-wipers, they provide a comforting cushion without compromising security too much.

I would be remiss not to mention the Evidence Eliminator, a wiping product from Robin Hood Software. Computer forensics experts say the product is specifically designed to thwart law enforcement officials investigating cases of evidence tampering and obstruction. After repeated e-mail inquiries, the company's director, Andy Churchill, declined to discuss how the product works or to explain the significance of its name.

The more heavy-duty data elimination tools, those that scrub everything off a hard drive, are generally more expensive and involve a far more complicated process. The most popular ones are probably DataEraser, by Ontrack Software, and Declasfy, by Mares & Company. Both of these products, on bootable disks (based on the old DOS computer language), work well and offer instructions that are more straightforward than those commonly found on such disks.

Of course, the cheapest data elimination tool can be found at your local hardware store for less than $5. It's called a hammer, and when applied with force to a hard drive that needs to be decommissioned, the results are foolproof.


Home | Back to Technology | Search | Help Back to Top

E-Mail This Article Printer-Friendly Format
Most E-Mailed Articles


It's easy to follow the top stories with home delivery of The New York Times newspaper. Click Here for 50% off.


Copyright 2002 The New York Times Company | Privacy Information
postA{XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate yƣA{i#intry(Pk ;~Q%Ϧ}ˀT:Edurl Nhttp://graphics.nytimes.com/images/2001/10/02/business/dealbook_nytdirect.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"6513a757-23-303-3bb9df15"hvrsdataGIF89a64111cccޭ{s{{!!,64I8ͻ`(dih)$f8¸; B0̐Kip%I @( {oCKrXsX.L "n6CD g2  =.u L MqeCfi?hUw=XH 9 Ø/;ѵl{ dʖwR қ|fX 3. Uҥ6--@ްp `K \g -m30lr18 [šCt,\\r#AD IW ,F+<{ PB s7FŨ#3DhRz"99lٍfV(PWy9"l>@xlxS f b$ R^tѣI#]uSտoH$},!fw1G y-5g tXQa5\ M,P -(NHAy(ΘKx("6JcBDBJt!GE$/e~`E[QexXQ (fJGոc7Г{^0_,h2dơ+D; post}XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate Pk}ߏ#jdntry()&PI6aqcݲ9h} rurl 4http://graphics7.nytimes.com/images/misc/spacer.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhntt"300aee6c-1-2d-3b014427"hvrsdataGIF89a!,X;postXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate )&PϷ&#kr-ntry((C0ryV61<z"n]Jurl Chttp://graphics7.nytimes.com/images/misc/pennants/shopnytstore.gifbsrlBhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.htmlmime image/gifhvrsdataGIF89aֺԺҺкκ̪˺ɺȪƪźº™uuuueeeeUUuuDDuueeDDuu00uuzUUy x00uuuqeepjhUUffffeeebDDb `^YSQ00NDDL00KG00DDDDD@00> >8 76000+ )& #"  ,@EFF.d^OQF!gM*S^da!gD7:gXB+aF]fWO@f gQѮ:8cۜa^dXgFfgƖ\NadӤ%1M!~kL#nj9ŝɓ(S\ɲ˗0-RM!jJ S1;\ gM4M#OԓP8) QcrŶ۷pʝKݻx{W߿ Ɇ;vfg]ŐYv5ҳW=d챦>FHRI֒e-M|;t:Ę l͜Hȃ#̜W2!DAߴ-4>rΥTzcӬ#wǷ(mg& $ `p b%fBTIBxWp q6ɃNX9r ha*X2b76*E@YR:hf!)[YPqZ%"p cYT)Vt\3XtgNC@08xA>m6`Ba2 q%izxSihSa@PD0Q),X)Bɨ)lUjk%F[IR@|FPA*eC'pa A ,B*ATFT7Щ%梛ܩڋ/C"Xq_q$l%,˄;post1<XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate (C1<5#kntry(伣|9zOt`]2\'DSourl l_~^bV+iP?zQ@_Ţ˯֤֋sqp)ؼvC0n䛀 r,% ŶѹۆG0󀀀 fA3boP!#"M6_㗀  oNw걝}sRۜ|aC~YJ#PPNi-'8)//,_A̐qش6.nNhE!,;Z"@`[`‡#Jt!- iȱǏ Cxb?DկK\3``̙żsfM7a Ò6H/-gVˢNSʓiM[Ԉ $FBM"S2#\2sx t֩St80$r19CcjC{42ӦLAtK Nխ݁nnj&*€PZ1ي*S6)[Batr;Cl׀K k39X!dK/ _'~'G礑94B8 rA~?$U:]eYuS? !%iP!0 ^[аP  D%!|" `A%Bbpv =8PF5&"s @mX x@x"шpፋPv!AVH(PHx4&<l_#c(O:8уUAeX\` f;AN3 }sw BB,dB X@ уAd6 k fA C pfZpPA wK®UZ0- 0lI5tTVfb `)CL@ ðC @Ђ \+8NP lb'L$~# 8@8.EpvP`d4pc.L w@! b02HQW*45A1̐3 9N؅z `va #CT$G:> P ):}̏iP*`@3.ueX XN8?<c`c?U v , <,б,XBQY  H 0>|0ëIz x082. 9PQc;A&xQ'8A/9&9H[4D' )43@E,DA6NH,.\yce"A@ y.oDm?}CA. eb-@츰98p Z t4h׃?dC G#.0@ /xt  H?h=c}8 Ah@7,DlBB]O " N=@kp {;`#`(|`\Ђ76qi 6=q ` pj(45-*:fP4 /*F;s@sEUZ \ PP0p-32/PlfA0ef\6,NcM:@Zbc,Lp , cp! bZf_s'f rA .j2Z[ˆ}=zbRa5P U  p p=Q~2.m1 P y5#qG'MA/`4WA.; x`p QI;_| yN/p W` 6p o 4)p;pdP~  u +` V0$D8z@0J +AʕJ` _D__@@ f C@]n p@_0 ;Cp;;y+r +@@ )@G zp oi`ә0 éC.Pyex7xW 7\+Q I r_I;6 Px + u% D7  )?z O p. D 0K dfpI?7 p WAy4 0 x *b|p #6`J @4J1l`$ f T 9 JУ`yrp0 #WHp@f0R>;ة _Pp fi+ J ηG  ৲ S p  9% >+Po);48 𖏰 `5 r`_P*PưK : H: ?P`x#>阭<  3 p 0 : +]0 p5d ||,/0 @@ d` j /P` 0 gap  99`0p !Kx[  c` BP >  W 2+ {2 T W {]pWph u0KP<Kt<qpq`qql W`<\|cxp u Џ yX'|.;Ш<о1pp0 ~T5PTPKоEh ~@I8P L, f\pƪ  p{phl$K{0 5 ƈ_S`70 ph ,`5ȇ\)h \I @C,媝T0ȸ6  5|>@p\j,P 1rK Cޠ0L0 ,PW) 5) ) {P5 k K@0  51@,0 {   T͝0<5L L@“ yYǬ Ph 0 hCP,p \ P`njIH-H pLC0ɪ  K KPK@@K,CȦ|ɝ\m׎FÌtANqB[*\dQ;/$I'K4%nC ,^f|CIKk<o͠4]( Mnm=DOIKDM]*`6:@aYR!C|}ڡ7$tc7Ȩ @-WJ v* d]Fuvᎋ9viwOz׍t@ 5(΍RcTѤQ#,fMB]gC1!spYrɕ@A3~0Wp 2"?i1ˡ_ؠP1&șQDj8.΀XT( PP'epgķ`C!^rB`hfy6FnV+i(q0y2 B6% Zqn&ҋ+K!ф(t0/3@crA,ڄ'8NJT&=i" *3R $+hbwPnEnD| E̘h5O`Б t&x4FUv'֠)N>x_Ld\ ف1eWV>Vaao\Et,X|y"AjN JDQk\\Pqcb\oEhw7 [Vu<>_1A :&T4>䁅ըӧaM>#]1ʈhĸ%UQ8HԄE'#,ns𵺌/ `[Ԁo!20&P>c(HQ` ERx }#mЬ,ψҚfS i~x#*'64]28 1 ,'F z`/}Po<K 6,~B" %Ǚ:a(C)%0] ѶH)AdsԱEK@@Dy:\c"ČozH52JQc TƂJ%@d%8yMWBn|g/#R_$DX(9 DC2/RtdP lFudRŠMD8ʥ隱x=5H "(vEkr8Odq:R AS@؉0 P b?@ YPR`bXC:Lxu1TؙdKR][uv25$d.ljDoMTYQxͬf7K;postBXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXcate Bt8#k cat pG;;6se|#bWnj`'ꃷ&#bq- ?,b{aw`&#bq-6"ej&#b[(/}ڮ&ٹ#cl& PY'p#cOV(Y'q#cN;@?tfY'n#c"1,NW#eQ~} E#eh ^Go#eˎ s+$#eb!hk#fnvtCtgƸ#f9M%r\#f@:fT%ѷ&#fQ-&W@$'L#glԜb Q,c#g#U[^ W1D#gk5u^7!3c#gUMڝ6}#ge/O.7⸄#gpeZ(:&#h0|h`>&#h$М^x CC#h|?V;,&#iX3w1ci#i+w-iXh3Zi#iq ‡`57&@#jskUC7,#j[>Y{Tj5Ŵ#jNn4`#j{f=B&S#jyƣA{i#iPk}ߏ#jd)&PϷ&#kr-(C1<5#k]2\' תg#kBt8#k aux ISURLAhttp://www.nytimes.com/2002/05/02/technology/circuits/02BASI.html