SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Compaq

 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext  
To: rupert1 who wrote (43436)1/13/1999 1:16:00 PM
From: TigerPaw  Read Replies (1) of 97611
 
Is it removed, distorted or suppressed? (Erased Data

One analogy of recovering erased data can be shown by holding two sheets of copier paper (with writing) up to the light, one directly in front of the other. You can still see some of the bottom sheet through the top.

Another analogy is to take a broad magic marker and draw a straight line on a piece of paper. Now take a different colored marker and quickly draw over the same line. Notice that some of the original color can usually be seen at one edge of the line or the other.

There are magnetic pickups which are more sensitive and precise than the usual disk read heads. These can look at the edges of the tracks and also detect residual magnetism to recover written over data. A security erase usually involves writing random patterns over and over and over hundreds of times to mess up these effects.
TP
Report TOU ViolationShare This Post
 Public ReplyPrvt ReplyMark as Last ReadFilePrevious 10Next 10PreviousNext