Welcome, Guest. Please login or register.
Did you miss your activation email?

Author Topic: [EN] Securely Erase a HDD With Active Status  (Read 2764 times)

KrunchTime

  • Guest
[EN] Securely Erase a HDD With Active Status
« on: 2015/08/16, 04:18:53 »
I am trying to securely erase a 700+GB HDD on one of my laptops.  I tried using:


Code: [Select]
dd if=/dev/random of=/dev/sda

but that was still going after 34+ hours, with no status.  Just for info, the dd command does not provide a status.  So, I did a bit of research and discovered the pipe view (pv) command.  Following is the command I am currently using to securely erase the referenced HDD:


Code: [Select]
cat /dev/zero | pv -brt | dd of=/dev/sda bs=1048576

The above command fills my hard drive (sda) with zeroes, providing a progress status while doing so.  If you know the exact size of your HDD, you can display a progress bar using the pipe view command:


Code: [Select]
cat /dev/zero | pv -brtp -s ##g | dd of=/dev/sda bs=1048576

where ## is the size of the HDD in gigabytes.


Sources consulted:
Dd - Destroyer of Disks
Checking the Progress of dd (see comments)
« Last Edit: 2015/08/16, 04:32:55 by KrunchTime »

Offline devil

  • Administrator
  • User
  • *****
  • Posts: 4.838
Re: Securely Erase a HDD With Active Status
« Reply #1 on: 2015/08/16, 08:09:10 »
If you want to be sure, there is nothing to recover with any means, you should run the process at least twice. People with the habbit of wearing tin foil hats do it more often. Another method is using urandom, which is even slower :)


greetz
devil

KrunchTime

  • Guest
Re: Securely Erase a HDD With Active Status
« Reply #2 on: 2015/08/17, 07:32:36 »
I haven't researched it myself, but according to the first link I provided as a consulted source, the blogger felt that wiping with zeroes was secure enough for most users.  I agreed with what he said.  My really personal stuff was under a TrueCrypt partition, so even if someone is able to undo the writing of zeroes over the whole drive, they then need to know that the TrueCrypt partition existed and the correct passphrase to open it.