Identify a few method to dispose of the hard drive of computers.

Slides:



Advertisements
Similar presentations
WHAT MAKES UP A COMPUTER BY SABRINA & BETH. MOTHERBOARD On the Computer, the Motherboard is where all the different parts are connected too work the computer.
Advertisements

Backing up Your Computer Jamie Leben IT-Works Computer Services Copyright 2010.
RAM Random access memory, or RAM for short, is active during the processing function. RAM is often referred to as “temporary memory.” RAM consists of electronic.
Hard Drives on Your Old Desktop Computer SIR Phil Goff Branch 116 August 21,
This presentation will take a look at to prevent your information from being discovered by and investigator.
Media Sanitization  NIST Guidance  Terms Defined  When is media under/not under your control?  Flowchart for decision making  Spreadsheet of.
Media Sanitization How to get rid of unwanted data so no one else can get it.
PHYSICAL SECURITY Attacker. Physical Security Not all attacks on your organization's data come across the network. Many companies focus on an “iron-clad”
Agenda Safe disposal practices for computers and information: –Removing files and folders –Disposing of computers –Disposing of other electronic devices.
C81MPR Practical Methods File Handling for Practicals Jonathan Stirk & Danielle Ropar.
Presentation by Neil Schmidt. Before You Start, Get Organized! On your old computer: Create “Music”, “Pictures” & “Videos” folders (if they don’t already.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Software utilities Gladys Nzita-Mak. Disk defragmentation Disk defragmentation makes computers run efficiently. When you save, change or delete files.
A Feature-Based of IT Automation using kaseya’s agent procedure called the wiping of unallocated disk space using cipher.exe Developed By: Estuardo Fernandez.
Chapter 5: System Software: Operating Systems and Utility Programs.
Data Deletion and Recovery. Data Deletion  What does data deletion mean in your own words?
ITE 1 Chapter 5. Chapter 5 is a Large Chapter It has a great deal of useful information about operating systems. You will find this VERY helpful when.
XP Practical PC, 3e Chapter 18 1 Buying a PC. XP Practical PC, 3e Chapter 18 2 Buying a PC In this Chapter, you will learn: –Where to begin looking for.
Chapter Fourteen Windows XP Professional Fault Tolerance.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 5 Windows XP Professional McGraw-Hill.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
1 Lesson 3 Computer Protection Computer Literacy BASICS: A Comprehensive Guide to IC 3, 3 rd Edition Morrison / Wells.
Data Recovery Techniques Florida State University CIS 4360 – Computer Security Fall 2006 December 6, 2006 Matthew Alberti Horacesio Carmichael.
Cloud Computing Characteristics A service provided by large internet-based specialised data centres that offers storage, processing and computer resources.
Viruses Reality and Myth. Virus – True or False Computer viruses happen naturally. FALSE.
Component 4: Introduction to Information and Computer Science Unit 4: Application and System Software Lecture 3 This material was developed by Oregon Health.
System Security Chapter no 16. Computer Security Computer security is concerned with taking care of hardware, Software and data The cost of creating data.
Tampa Computer Recycling. Our Tampa computer recycling company takes responsibility of safely disposing of all older computer systems and their electronic.
Power Supplies. Takes electricity from the wall socket and transforms it into electricity to run the motherboard and other internal components.
WE ARE DATA By Hazim Zaidani Do you really think that your personal data is protected ? Well… Think Again !!!
1 Computer Maintenance Upgrading Your PC: Flash Memory and Gathering User Information Copyright © Texas Education Agency, All rights reserved.
Chapter 6 Protecting Your Files. 2Practical PC 5 th Edition Chapter 6 Getting Started In this Chapter, you will learn: − What you should know about losing.
Viruses Hackers Backups Stuxnet Portfolio Computer viruses are small programs or scripts that can negatively affect the health of your computer. A.
XP Practical PC, 3e Chapter 6 1 Protecting Your Files.
Computer Safety Sid Holder 8k Viruses Hacking Backing Up.
How Not to Lose the Only Copy of Your Research Storage and Backup Tools at Brandeis Melanie Radik and Raphael Fennimore Library & Technology Services Workshops.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
Understanding Backup and Recovery Methods Lesson 8.
 Hardware compatibility means that software will run properly on the computer in which it is installed.  When purchasing software, look for one of these.
IDENTITY THEFT By Deshano Dottery. FASTEST GROWING PROBLEM IN AMERICA Approximatley 15 million victims per year Approximatley 15 million victims per year.
Virtualization Supplemental Material beyond the textbook.
Adobe Acrobat Pro IST Webstore William Lewis. Two Related Topics Managing Acrobat Pro –How it gets installed IST Webstore –How software is purchased from.
Society & Computers PowerPoint
1 Maintaining the Windows O/S. 2 Introduction Virus protection Remove old and unused files Scan hard disk Defragment hard drive Back up and updated recovery.
Hyper-V Recovery Software Ideal Application to Get Data from VHD v2.1.
Website:
Photo Recovery How to Get Back your Lost Photos Easily?
Visit:  If you have lost important files, take a deep breath and rest assured that disk recovery software can likely help.
Sniper Corporation. Sniper Corporation is an IT security solution company that has introduced security products for the comprehensive protection related.
Inutsystems.com. Recovery passable in Any make of the hard disk like any laptop (small) hard disk Extra. We Deal all Operating Systems. Like all windows,
Phillip Schneider Information Services Librarian Gail Borden Public Library District Building a PC Part 3.
Identity Theft: Protect Yourself Ronald J. Leach.
The information that is stored on business computer and hard drives needs to be securely destroyed and is important part of managing the information security.
Complete System Backup Microsoft Acronis TimeMachine (Mac)
Chapter 6 Protecting Your Files
IC3 GS3 Standard COMPUTING FUNDAMENTALS Module
If you are facing the problem in the availability of hard disk space is significantly lower than the total capacity of the disk then you are not alone.
Installation and maintenance hardware.
Introduction to Computers
Introduction to Computers
Outlook Recovery Freeware is the professional tool to fix Outlook Error and PST corruption.
Chapter 6 Purchasing and Maintaining a Computer
Diskless network security
Upgrading Your PC: Flash Memory and Gathering User Information
Normal deletion Shift deletion
Solutions to Secure File Deletion
Data Recovery: Why Secure Deletion is so Important.
Overview of Computer system
Presentation transcript:

Identify a few method to dispose of the hard drive of computers.

Nowadays, there are many technological devices developed, people still does not know how to properly dispose of their devices. Hence, we are going to identify a few method to solve this problem so that the devices have been safely disposed besides can protect you from identity theft.

1) Reuse - Remove the hard drive from your old pc and install it in your new systems for extra storage space. - This can save the budget if you want to add another space for your computer for a various purpose.

2) Melting the hard drive - If there’s a machine shop nearby your residence, they can melt your hard drive for a small fee. Make sure you see it with your own eye it being melted.

3) Hammer the hard drive - This is also the safest ways to protect your hard drive. - Make sure you totally destroy it so that it cannot be repair back.

4) Disk wiping - You can purchase disk wiping software which will make data recovery even by professionals impossible. Disk wiping process involves overwriting your entire hard drive with data, several times. After disk wiping is complete, then you will format your hard drive and the data that existed before overwrite will be impossible to recover.

5) Degaussing - Find a local company that use degaussing machine that will essentially destroy all data on your hard disk drive, degaussing a single hard drive shouldn’t cost too much.

These are a few tips that we can practice so that our hard drive can be safely dispose. It is hope ALL Malaysian can benefit this knowledge for a better life.