We use cookies on this website. By using this site, you agree that we may store and access cookies on your device Read More Got it!
BitRaser 5 minute read

How to completely erase your old electronic devices before discarding them

Jyoti Prakash
Written By
Jyoti Prakash
Rohit Arora
Approved By
Rohit Arora
stellar calander
Updated on
July 21st, 2022

The blog describes how we can completely erase your old electronic devices before discarding them.

They say change is the law of nature and to survive, we must keep adapting to the new. The same logic applies to technology. Each day new gadgets and electronic media are launched with better features and enhanced purposes. As such, we as users keep hopping from old devices to new ones frequently. But most of us take a little care to safeguard our personal data stored on an old electronic device before moving to a new one.

“We generate around 40 million tonnes of e-waste every year globally. That’s like throwing 800 laptops every second”

Completely Erase Data from Old Electronic Devices

Why do deleting / formatting prove to be ineffective?

For a majority of users, deleting files or formatting the media seems like the best way to wipe all important data. However, what we do not know is that the data exists on the media even after we execute the delete or format command. A delete command simply erases the pointers to files thus making it impossible for the OS to locate the data. That’s why you can’t see it. But the data is very much on the device till it is overwritten with new data. Think of this as tearing off the Table of Contents from a book; you won’t know how to locate a chapter, but all chapters would still be on the book.

This is what data recovery tools take advantage of. They scout for data that still exists on the drive and provide options to recover them. Using any commercially available data recovery product, anyone with the wrong intentions can get their hands on your personal files if you’ve not made absolutely sure that you’ve wiped the device clean. Thinking on those lines, are you still convinced you’ve done enough to protect your personal or other sensitive information on your old electronic devices?

If not, the next section describes some easy and efficient ways to completely erase your device of all data.

Effective Data Erasure Techniques

Even damaged hard drives or media can contain sensitive data that can be recovered. Hence, just to be sure that your data doesn’t get into the wrong hands, it is necessary that you completely destroy it before you discard the device.

  1. Physical Destruction of the device

Physical Destruction of the Device

This is actually the simplest method to make sure the device cannot be used to extract important information. Physical destruction includes breaking the device apart or shredding it to small pieces using machines or mechanical shredders. Once a device is physically destroyed beyond use, no data can be recovered from it. For example, in the case of hard drives, drilling holes into the drive can physically destroy it. However you should know that physically destroying the device doesn’t imply that you are erasing data off it. It means that you’re making the device unusable for good. So this can also be seen as a disadvantage of the method. A variety of techniques can be used to physically damage electronic media, and they include disintegration, incineration, pulverization, shredding, melting, sanding, and chemical treatment.

To help you make an informed choice, here are the pros and cons of this method:

Pros Cons
If carried out perfectly, this is the simplest and most effective way to make sure data on the device cannot be used. This method renders the media itself useless. It would be better to find a way to destroy only the data and reuse the device.
With this method, you can destroy a large amount of data (all the data on the device) in one go. If hard drives or other media are physically destroyed, you cannot resell it to get any compensation. Thus it is a blow to remarketing value.
This method can be used with any kind of media. Physically destroying media takes time and the debris flying from the process can pose health risks.
This process usually needs to be outsourced thus compromising data security.
  1. Degaussing or Magnetic destruction of recorded data

Degaussing is the process of removing all magnetically recorded data on media by applying a reverse magnetic field using machines. By returning the magnetic flux to a zero state, this method erases all content on the magnetic media. It is worthwhile to note that different magnetic media require different magnetic field strength. So if the electromagnetic field created by the degaussing machine is not strong enough for a particular media type, the process may remain incomplete. Moreover, contrary to the past when strong electromagnetic field wasn’t required for degaussing, modern hard drives use thicker shielding and thus require stronger fields.

Just as the process of physical destruction, there are several cons associated with degaussing like huge costs, unreliability, permanent destruction of the media, no guarantee of data erasure and more. Here are the pros and cons of this method:

Pros Cons
Effective enough to destroy all data on magnetic media especially if the media requires a low electromagnetic field. No guarantee that one degaussing machine produces a field strong enough to destroy data on different types of media.
This process takes less time. Renders media permanently unusable
Can be used on a variety of media. The machine itself is expensive
Since degaussing machines can be used over and over again, once bought they usually don’t require further investment. This technique can only be used on magnetic media
Degaussing doesn’t provide reporting of the erasure process that is needed for regulatory compliance
  1. Software Overwrite

This process involves using special software to overwrite existing data with patterns of meaningless data (random combination of 1’s and 0’s). This writing is done on each sector of the hard drive 2 or 3 times to ensure that any and all existing data is thoroughly overwritten beyond recovery. The more times data is overwritten, the more the level of security.

Though reliable than the previously mentioned techniques, even software overwriting is not fool-proof. Here are its pros compared with cons:

Pros Cons
Effective and convenient way of permanently destroying data such that media can be reused This technique cannot be used if the media is damaged
Can be performed in-house thus eliminating  the risk of data theft at service center Freeware / Shareware tools available for this purpose might promise a lot but just be another threat to data
Software that perform overwriting usually generate detailed reports of the process

Need of a secure data erasing software

Out of the many data erasing software available in the market, not all provide secure service. A few such tools cannot access hidden or locked areas of the hard drive such as Host Protected Areas (HPAs), remapped sectors etc. Such tools end up performing an incomplete data erasure leaving some of the data intact. So a tool that can access all areas on the hard drive and bypass BIOS and OS would be optimum to perform complete data erasure.

A recommended product that fulfills these needs is BitRaser, a data erasure. This powerful data erasing software overcomes the limitations of other techniques mentioned above and provides complete data erasure for hard drives upto 32 which boots through USB. For individuals who are concerned about their confidential files and folders and eager to wipe hard drive files and folders can try BitRaser for File, this secure file eraser software also erases system & application traces, internet activities, and unused hard drive space. You can wipe them using US Department of Defence wipe method (3 pass or 7 pass).

unused space-BitRaser

Final Words

Thus, making sure your electronic media is absolutely clean of data is imperative before you dispose of your old devices. Using robust and proficient software like Bitraser makes sure none of your important data gets in the wrong hands.

About The Author

Jyoti Prakash

Problem solver and Data recovery specialist. Usually share informative articles on data recovery, database corruption and ways to recover lost data.

Best Selling Products

Stellar Data Recovery Professional for Windows

Stellar Data Recovery Professional for Windows

Stellar Data Recovery has the right Windows Recovery tool for all your data recovery

Read More
Stellar Data Recovery Professional for Mac

Stellar Data Recovery Professional for Mac

Stellar Data Recovery for Mac program performs safe..

 

Read More
Stellar Photo Recovery

Stellar Photo Recovery

A comprehensive photo recovery software to restore photos, music & video files

 

Read More
Stellar Repair for Video

Stellar Repair for Video

Powerful video repair tool for repairing corrupt or damaged MOV and other video files

 

Read More

33 comments

  1. James Logan says:
    December 28, 2017 at 10:09 am

    To maintain the privacy of me and my family. I recently erased my Windows based laptop using US DOD 7 pass algorithm using DIY data erasure software

    Reply
    1. Manish Bhickta says:
      December 28, 2017 at 11:04 am

      Hello James,

      We really appreciate your efforts. US DOD algorithm either 3 passes or 7 passes and many similar algorithms is the complete solution towards safe data sanitization.

      Reply
  2. Jonathan Baldwin says:
    October 30, 2017 at 10:23 am

    I was associated with a local NGO since my early college days. I always feel like doing something for the NGO especially financially. Most of the times, due to limited salary and other family expenses. I never managed to help them monetary. But I always take time to provide basic elementary computer education to the kids there. Due to extensive official work, I seriously need to upgrade my existing PC machine to higher configuration. At the same moment, I planned to donate my PC before wiping with this magical data erasure software (BitRaser). A neat and clean software interface.

    Reply
    1. Manish Bhickta says:
      October 30, 2017 at 11:17 am

      Hello Jonathan,

      We really appreciate that you share your experience with us.
      Please don’t forgot to follow us on twitter for more updates and offers.

      Reply

Comments navigation

Older comments Page 1 … Page 3

Leave a comment Cancel reply

Your email address will not be published. Required fields are marked *

Image Captcha
Refresh Image Captcha

Enter Captcha Here :

Table of Contents    arrow

Categories

offer banner

Related Posts

related post
BitRaser

Learn: Why to Wipe Your HDD Clean Before Selling

Stellar Author Aruna Attri July 2, 2019 Read More
related post
BitRaser

Data Erasure – a silver bullet to bring down e-waste

Stellar Author Satyeshu Kumar June 5, 2019 Read More
related post
BitRaser

Data Privacy Risks with Used Media

Stellar Author Aruna Attri April 10, 2019 Read More

Free Trial for 60 Days

Stellar Official Website

Stellar Data Recovery Inc.
48 Bridge Street Metuchen,
New Jersey 08840,
United States

ALSO AVAILABLE AT

Partner Logo

About

  • About us
  • Career
  • ISMS Policy
  • Privacy Policy
  • Terms of Use
  • License Policy
  • Refund Policy
  • End User License Agreement

RESOURCES

  • Blog
  • Articles
  • Product Videos
  • Knowledge Base
  • Case Studies
  • Whitepapers
  • Software Catalog

NEWS & EVENTS

  • News
  • Events

PARTNERS

  • Affiliates
  • Resellers
  • Distributors

Useful Links

  • Contact Us
  • Support
  • Special Offers
  • Student Discounts
  • Awards & Reviews
  • Downloads
  • Store
  • Sitemap
Follow Us

tw in yt

Stellar & Stellar Data Recovery are Registered Trademarks of Stellar Information Technology Pvt. Ltd. © Copyright 2023 Stellar Information Technology Pvt. Ltd. All Trademarks Acknowledged.

Hippa Logo tuv footer partner logo DMCA.com Protection Status