Re: How many overwrites for secure erase?



"Sebastian G." <seppi@xxxxxxxxx> wrote in
news:62q4cpF2486s5U1@xxxxxxxxxxxxx:

[snip]

This is nothing special though, even Peter Gutmann mentions much more
potent ways like magnetic force scanning tunneling microscopy.

and even gutmann says that no longer works and that 3 random overwrites is
about as good as you can do.
.



Relevant Pages

  • Re: How many overwrites for secure erase?
    ... more potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random ... overwrites is about as good as you can do. ...
    (alt.computer.security)
  • Re: How many overwrites for secure erase?
    ... potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random overwrites is about as good as you can do. ...
    (alt.computer.security)
  • Re: How many overwrites for secure erase?
    ... more potent ways like magnetic force scanning tunneling microscopy. ... and even gutmann says that no longer works and that 3 random ... overwrites is about as good as you can do. ...
    (alt.computer.security)