...

Privatise your PC before moving on

ICT Materials 19 February 2008 06:31 (UTC +04:00)

( dpa ) - If you've been using a computer for some time and need to abandon it - either because you're leaving a job or moving to another machine - you need to be concerned about security. Simply put, once you're gone, a lot of information can be retrieved about you just by inspecting the digital traces you leave behind.

So before you say goodbye to a PC, follow this list of to-do items to ensure that no one gains information about you that they do not need to know.

Clear passwords and forms

The applications on your PC keep a record of almost everything you do. By default, your Web browser probably leaves tracks from a lot of the sites you've visited, stores the user names you use online, the files you've downloaded, and even passwords, if you allow it.

Many business applications also keep track of the documents you've last worked on or edited. "Histories" are useful to those who need quick recall of what they last worked on, but they're anathema to those who require privacy.

There are ways to selectively clear usage history with each of the applications that keep such records. For instance, with Internet Explorer, you can open the Tools menu and select Options. From there, you'll be able to remove your browsing history, form data, and other personal information.

But because it's difficult to remember exactly which applications are keeping a record of how you've used a computer, a better solution is to turn to a tool that specialises in removing traces of every document you've worked on or website you've visited. You can pay for tools that do this, but there are plenty of perfectly capable tools that perform the task for free.

Clear History (http://www.erase-history.net/), for instance, removes the history of activity kept by most popular applications. It can clear not only document and Internet history but also can ferret down into more arcane data and registry information, removing any record of your activity.

Shred sensitive files

If the PC you've been using contains sensitive files, it's not enough simply to delete them. Even if you delete a file and subsequently remove it from the recycle bin, a savvy user can reconstruct deleted data and potentially gain access to files that you thought were gone for good. Even a nontechnical user can recover deleted files by using one of a number of widely available file recovery tools on the market.

So to delete sensitive files, you have to turn to something more robust than the delete key. Software-based file shredders fit the bill. Most of these applications work by scrambling the contents of a file using special algorithms. The result is not only a deleted file but one that is unreadable even if recovered.

While commercial programs exist for the job, there are free alternatives as well. File Shredder (http://www.fileshredder.org), for instance, offers five types of shredding algorithms, each offering a different level of security.

Destroy e-mail

Your e-mail probably holds plenty of information you'd rather not see fall into the hands of someone who comes along to use a computer after you. So it's critical that you know how to destroy e-mail you do not want others to see.

First, though, that deleting e-mail from a machine that has been connected to a corporate network probably does not actually remove all traces of messages you've revived or sent. Many companies are required by law to keep copies of the e-mail their employees generate, so your best course of action is to plan ahead and never send sensitive information by e-mail from work.

You can delete e-mail messages individually using the Delete key on particular messages. Remember, though, that deleting e-mail messages this way just sends them to the Deleted E-mail folder, where they will need to be deleted again. Holding down the Shift key while deleting messages sends them directly to the recycle bin in Outlook and Outlook Express.

If you have lots of archived e-mail stored in the popular Outlook program, removing all traces of the mail involves locating the files that contain the messages you've sent or received. Search the hard drive for files ending in the extension "pst." Once you locate those file, you can simply remove them from the system - or use a file shredding program to get rid of them entirely.

Wipe the hard drive

If you have the option to completely wipe out a hard drive before leaving a machine or returning it, take advantage of it. A study by researchers at Britain's Glamorgan University showed that more than half of the used hard drives purchased from eBay contained retrievable personal and financial information. Reformatting an old hard drive isn't enough, since even a standard reformat can leave the data on a disk vulnerable to retrieval by savvy users.

So you need to look into disk shredding tools before passing on a hard drive that may contain sensitive information. As with file shredders, you'll find plenty of commercial utilities that can accomplish this task, but capable free ones exist as well. Look to the popular Darik's Boot and Nuke (http://dban.sourceforge.net), for instance. This program runs from a boot disk or drive and proceeds to securely erase any hard drive that it finds on a system.

Latest

Latest