![](http://content.invisioncic.com/d154966/set_resources_6/84c1e40ea0e759e3f1505eb1788ddf3c_pattern.png)
Augeas
-
Posts
4,542 -
Joined
Posts posted by Augeas
-
-
You can either sort the files in the list (in Advanced mode) using the Filename or Path box, so that only the files you want to recover are shown, tick the checkbox in the top l/h, right/click and select Recover Checked, or set the view Mode to Tree, highlight the folder you want, right click and select Recover Highlighted.
-
I don't think that it can beat the disk controller, as defraggers will re-arrange the logical cluster numbers and the controller will just go ahead and put the data wherever it feels like (Which is why you can't overwrite a file on SSD).
What would be sooper would be a defragger for SSDs that defragged the LCNs, and the SSD controller just remapped its er, maps without moving any data. Thus logical I/O would be reduced with no wear on the SSD. But that's pie in the sky.
-
Si seulement nous savions.
-
This has been raised in other topics. It seems that the index.dat files are not listed anywhere in either analysis or clean, and there's some confusion whether the important ones are cleaned (CC never cleaned all index.dat files). Documentation on this is zilch, so we're still in the dark.
-
How long does it take for Avira to delete these files? If you're getting a lot of infections then I would use Avira to delete them.
-
Try it without wipe mft. I've never used that option but I imagine there's a fair amount of work involved.
From what I remember you can't rum wipe mft without wipe free space, so untick that too.
-
The first analysis after opening CC always seems to take longer than subsequent analyses or runs: what deletion option are you using?
-
Where is the option to stop resurrecting a 20-month-old thread with a completely irrelevant posting? Ah, here it is.....
-
Run Recuva in normal scan, switch to Advanced mode if you have run the Wizard, select Emails in the Filename or Path box at the top r/h. Do you see a file called Outlook Express emails.zip? If so recover this to some folder, open it and see what's inside.
-
The problem with this topic is, as has already been pointed out, that there is a very woolly definition of the tests or processes that have been run. Much of the time the responders have had to guess what was done.
It's not good enough to say that "You are wrong if you assume that CC is a 'clean to industry data sanitisation' standards. CC has never claimed to do that, it is primarily a temp file remover."CCleaner IS claiming to "Securely erase the contents ... on a drive". It says so on the Drive Wiper page! It does NOT say that it will "just remove temp files", or even "securely remove most of the files, probably".
I don't want to keep picking on the same person/post, but the statement: "I don't think that any application running under Windows will do what you want, there's just too much going off in the pagefile, logfiles, heaven knows what files for that to be true." - surely cannot be true. As I understand the accepted methods of cleaning a HDD, each bit on the physical disk is actually overwritten - in the NSA case, 7 times. There are no pagefiles or logfiles (or any other files) that can somehow escape and survive this procedure. It is physically impossible. (Ask the NSA!!!)
Well, my definition of an industry data sanitisation standard would be (and I hope that any reputable organisation that performs data sanitisation would agree) that the process is documented, verified and certified. Piriform has never done that.
CC does securely delete data, a single overwrite (NSA is a red herring) of a sector or cluster will make the data on that sector/cluster unrecoverable forever. The problem here seems to be that not every sector is overwritten.
No Windows application can ever clean etc is true, on the system disk for the reasons given. As for CC wiping non-system disks (the only option for an entire drive wipe) I'm not so sure. The process is entirely different from DBAN, (which has been mentioned here) as that is, as far as I know, run from a cd completely independent from any o/s on the disk. CC, on the other hand, reformats a partition, and then runs the wipe free space option. This will of course leave a fair amount of live meta files and boot code in the partition.
DBAN, by the way, does not guarantee its results and does not offer any certification.
'It does NOT say that it will "just remove temp files", or even "securely remove most of the files, probably".'. True, but then nobody ever used these phrases in this thread either.
Does NSA use CC? I really don't know. But I'd put quite a lot of money on them not using it for data sanitisation.
-
Mr F, my spouse has an old laptop with an Intel 900 MHz chip, 15 gb disk, and originally 64 mb of ram and XP Home SP1. It was rather slow. The main things we (I) did were:
Increase ram to a max of 512 mb - this is the most important speeder-upper
Migrate to SP3
Increase pagefile to 1 gb min/max
Use pagedfrg to defrag pagefile and other sys files (free)
Removed AVG and installed Avast - noticable imporovement
Removed every last thing (almost) from Startup
Removed as much junk as possible
Defrag using Win defragger
There is still a lot in the registry, but I have not really dared to look at it apart from some obvious twiddling. But it now boots in around 1 min and is quite livable with. All free except for the ram.
-
If there's no free disk space them you may have somehow retained the large file(s) that wfs uses. There should be some very large files in the root folder with very long randomish names. Delete them. I don't know how you can boot into command mode in Vista to do this. Vista users?
-
It seems what's worrying you is the sight of those purple blocks. They will not affect your use of the pc at all. When the drive is 7/8 full files will be written in the MFT reserved space. Personally I'd just ignore them, it's an aspect of XP as ElP says.
-
Yes, if you upgrade to Vista/7.
-
Before this gets out of hand, there is nothing I can see in the o/p's posts that suggests that any illegal activity is taking place. Secure deletion is perfectly legit, so no implied slurs, please.
-
I should have said 'Did your brothers format the drive when they wiped it?'
You could try a normal scan with Scan for Non-Deleted Files checked, but I wouldn't hold much hope as you've already run a deep scan.
In a deep scan try sorting the file list by name to see if there are other copies that can be recovered. If you find the files and they have a size of zero then recovery is not really possible by any way I know.
-
You are wrong if you assume that CC is a 'clean to industry data sanitisation' standards. CC has never claimed to do that, it is primarily a temp file remover. I don't think that any application running under Windows will do what you want, there's just too much going off in the pagefile, logfiles, heaven knows what files for that to be true.
Try running CC's drive wiper with wipe entire drive enabled, on your test drive. Then let us know what you find. There are really too many unknown variables to say what's happening in your current tests.
-
If your disk, or partition, was formatted then most of the data should still be available. Try running Recuva with Scan for Non-Deleted Files checked in the Options box.
If you say that the file size is now zero then you must have found some version of the file. Did you find the file using a normal scan?
When the file size is zero it usually means that the file has been specifically deleted, as mentioned above.
You might find a copy of your file by doing a deep scan, which will take some time.
The MFT is the Master File Table, which holds the address of every file on your drive. If the contents of the MFT are altered then it makes it more difficult to recover the file.
-
The extent of the damage depends on what you mean by 'my brothers decided to wipe our computer.'
If your novel was a large file then it is likely to have multiple extents, and the data runs that locate the file clusters may be held in a second MFT record. The Windows cleanup when deleting a large file will overwrite most of the data runs in the MFT records, and recovery utilities will not be able to establish the original size of the file, or its location. In this case is is impossible to recover the file except by finding and reassembling the lost file clusters, an expensive job.
If you let us know what wipe means then we may be able to help.
-
I'm surprised that Recuva can see the drive letter if your pc can't. Have you checked Scan for Non-Deleted Files?
A deep scan will of course show all your deleted files, and on 130 gb will probably take forever to run and produce tens, if not hundreds, of thousands of file to plough through. I would put deep scan to oneside at the moment.
A format won't necessarily loose all of your data. A quick format will rebuild your volume boot record and MFT and leave just about all of your data untouched. You should then run the Scan for Non-Deleted Files option. Entirely at your own risk, of course.
-
WFS will overwrite all the free space on your drive, and leave all live files untouched.
Wipe Entire Drive will only run on a non-system drive. It will format the drive and then wipe all free space as in WFS.
How many passes? One is perfectly sufficient. More achieves nothing except hammering your disk.
-
If you run using the Wizard then you will have to switch to Advanced Mode. Do this by clicking the Switch to Advanced Mode box at the top r/h. If you're not using the Wizard then this doesn't apply.
-
In Advanced mode (if you've used the Wizard click on the box top r/h that says switch to advanced mode) you can sort the columns on name, date, path, etc., or enter file or path search values in the File/Path box (top r/h).
-
No Gutmann. One overwrite will do fine for secure deletion.
Greetings von der Inselaffen.
Recuva not working?
in Recuva
Posted
How large are these files? Are you recovering to a different device/partition?
I should try recovering them one at a time.