APC Australia

Securely delete data with Eraser

Worried about your old data? Nate Drake offers a permanent solution.

-

The revelation­s by Edward Snowden about NSA spying activities and the recent introducti­on of stringent data protection laws in the EU have left everyone, from privacy-minded individual­s to big businesses, worried about data security. As any power user knows, any files that are nominally ‘deleted’ by Windows usually remain on your hard drive. The OS simply changes a few bits in the file header to tell the system the data is no longer required. As useful as this is for legitimate users who may have deleted data by accident, bad actors, such as hackers, can use freely downloadab­le digital forensic tools to recover your files in seconds.

Eraser, which comes to us courtesy of Heidi Computers in Wicklow, Ireland, seeks to restore the balance. This free utility works by repeatedly overwritin­g every bit of data in files or folders you select to delete it securely. Eraser is highly customisab­le: You can choose your own erasure method, such as seven passes of pseudo-random data, and can even automate tasks, such as overwritin­g free space on your hard drive. While Eraser isn’t completely effective when it comes to flash memory (see opposite) and more advanced forensic techniques, you can gain some peace of mind knowing you’re using the very best erasure methods available.

1 SET UP ERASER

Open your web browser of choice and navigate to eraser.heidi.ie/download. Click the Download tab and then choose the most recent stable version of Eraser, which is at the top of the list. Your browser is now redirected to Source Forge, which hosts the installati­on files. Windows 10 displays a security alert at this stage. Click Yes to begin installati­on. The setup wizard first tries to install the .NET Framework 4 on your machine. If this is already installed on your version of Windows, you may see a system prompt. Click Close to proceed. Select Next on the welcome screen, and check ‘I accept the terms in the license agreement’. The wizard now asks you to choose an installati­on type. A Typical install incorporat­es of all Eraser’s main features. Choose a Complete installati­on if you want to include additional functions, such as shell extensions. Click the Install button once you’ve chosen the type of installati­on you want, then click Finish to close the setup wizard.

2 ERASE DATA

If you chose to install shell extensions, you can access Eraser with just a few clicks of your mouse. Open the File Explorer, and navigate to the file or folder you wish to securely delete. Right-click to open the context menu, and move your mouse to ‘Eraser’, then choose Erase [ Image A]. The first time you do this in Windows 10, you’ll need to click Yes to grant Eraser permission to make changes. Eraser asks you to confirm before proceeding. Remember that any data removed will not be stored in the Recycle Bin prior to deletion, so carefully check you have the right informatio­n before clicking Yes. Eraser displays a notificati­on reading ‘Task Completed’ once your data has been securely erased. This may take some time, depending on Eraser’s configurat­ion.

3 CONFIGURE ERASER SETTINGS

By default, Eraser uses the Gutmann method to delete files, which involves overwritin­g data 35 times. While this is ultra-secure, it’s usually overkill for most users, and can take hours or days to complete for larger files. Fortunatel­y, Eraser supports a number of different methods to remove data. Launch Eraser and click Settings. Find the ‘Erase Settings’ section, and select the drop-down menu marked ‘Default file erasure method’. The US Department of Defense standards for erasing data involve either three or seven passes, depending on the sensitivit­y of the

informatio­n. While theoretica­lly not as secure as the Gutmann method, they are much more efficient. Click ‘Save Settings’ at the top-right to confirm changes.

4 PLAUSIBLE DENIABILIT­Y

While deleting files with Eraser makes them very difficult to recover, anyone with access to your hard drive can potentiall­y view the clusters of pseudo-random data on your drive, and realise that you have something to hide. Mercifully, Eraser supports ‘plausible deniabilit­y’. This works by placing a harmless-looking file, such as an MP3, over erased data, making it much more difficult to tell where sensitive files were located previously. To do this, first choose a folder to use for decoy files, such as a music album. Open Erasure’s settings, and check ‘Replace erased files with the following files to allow plausible deniabilit­y’. Next, click ‘Add folder’ and select your chosen files [ Image B]. Click ‘Save Settings’ once you are done. Note that with the advent of file journaling and SSDs, plausible deniabilit­y has become difficult to achieve in practice. We strongly recommend using full-drive encryption (see opposite).

5 SCHEDULING TASKS

Eraser supports automated deletion of data [ Image C]. This is useful for removing files in obscure locations, such your web browser’s cache. Click ‘Erase Schedule’, then select ‘New Task’. Under ‘Task Properties’, first enter a meaningful name in the name field, such as ‘Erase Google Chrome cache’. Choose Recurring under ‘Task Type’, then click ‘Add Data’. In the new window, select ‘Target type’ — for example, ‘files in a folder’ — and choose an erasure method, such as Gutmann. Use Browse to enter the file or folder path, then click OK to confirm. Finally, click the Schedule tab to determine the time and frequency of your new task, such as at 1.30pm daily. Click OK to set your new scheduled task. You can also use this feature to regularly erase free space on your hard drive. Simply choose ‘Unused disk space’ in the ‘Add Data’ section. You can also manually overwrite free space on any drive by right-clicking it in File Explorer, and choosing ‘Eraser > Erase Unused Space’.

6 SECURE MOVE

Eraser also incorporat­es a handy feature for moving files and folders securely. It does this by creating a copy of your data in virtual memory, securely erasing the original, and copying the file or folder to a destinatio­n of your choice. To make use of this feature, first open File Explorer and navigate to the file or folder you wish to move. Right-click to open the context menu, and choose ‘Eraser > Secure Move’ [ Image D]. Eraser automatica­lly opens a prompt asking you to select the target destinatio­n, such as a USB drive. Navigate to this and click OK. Eraser manages the copy process and securely removes data in the usual way. By default, Eraser overwrites drives with one pass of pseudorand­om data. If this isn’t sufficient to abate your paranoia, access Eraser’s settings, and choose a more secure method from the drop-down menu under ‘Default drive erasure method’.

7 SECURELY ERASE RECYCLE BIN

If there’s content on your PC that you’ve deleted previously, follow the steps outlined above to erase free space on your hard drive. If, however, the files and folders you want to remove are still in your Recycle Bin, Eraser can securely move these in place. Simply rightclick the Recycle Bin and choose Erase. If you’ve previously enabled the plausible deniabilit­y feature, note that Erasure doesn’t place decoy files in the Recycle Bin. Be sure to use Eraser directly on sensitive data in future if you want to avoid scrutiny of your hard drive.

 ??  ?? B
B
 ??  ?? A
A
 ??  ?? C
C
 ??  ?? D
D

Newspapers in English

Newspapers from Australia