Must we trash an excellent laptop?

Page 5 - Seeking answers? Join the Tom's Guide community: where nearly two million members share solutions and discuss the latest tech.
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

> EMwrote:
Q1: Wouldn't swapping the board with one from another *IDENTICAL*
drive defeat the pwd?
Yes, but you won't be able to read the original data as the drive's
data addresses will have changed. The drive will be usable, but only
to the extent that it could now be formatted.
> EMwrote:
Q2: Do the latest Toshiba drives (mounted in a Thinkpad) support the
password feature?
Yes.

==============
Posted through www.HowToFixComputers.com/bb - free access to hardware troubleshooting newsgroups.
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

> Papawrote:
O, well. I tried. In your case (and in Barry's case and for anyone
else with
> this notion) I sincerely hope it doesn't happen. Good luck.
And those of us who
know what
we're talking about sincerely hope no one actually takes you
seriously.

==============
Posted through www.HowToFixComputers.com/bb - free access to hardware troubleshooting newsgroups.
 

papa

Distinguished
Apr 6, 2004
99
0
18,580
Archived from groups: comp.sys.laptops (More info?)

O, well. I tried. In your case (and in Barry's case and for anyone else with
this notion) I sincerely hope it doesn't happen. Good luck.
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

On Thu, 05 Aug 2004 04:48:20 GMT, EM <1@1.1> wrote:

:>JHEM wrote:
:>
:>> No, the PW is not stored on the HD media, it's written to an EEPROM on
:>> the drive's circuit board and without it the HD is toast.
:>
:>Q1: Wouldn't swapping the board with one from another *IDENTICAL* drive
:>defeat the pwd?

Based on personal experience I would say no. A few years ago we had a
couple of local FBI agents bring us a password protected hard drive from the
computer of a suspected drug dealer. We did replaced the pcb with one from
a brand new drive of the same model. We were still unable to access the
hard drive. Attempting to boot from the drive got the password prompt and
putting the drive secondary in another computer we got some error message I
don't remember any more and couldn't access it that way either. This led us
to believe that there is both information stored on the pcb and on the drive
itself that somehow have to synchronize with each other before you can
access the drive. Any yes, we went the other way and put the password
proected pcb on the new drive and got the same results.

me/2

:>Q2: Do the latest Toshiba drives (mounted in a Thinkpad) support the
:>password feature?
:>
:>
:>>
:>> The security is good enough to prevent a casual thief from accessing
:>> the data on the HD, although certainly a tech could access it with a
:>> few hours of sweat and some specialized equipment.
:>>
:>> Same goes for the supervisor level of PW (NOT the power on PW), it can
:>> also be circumvented. But it's beyond the capabilities of a casual
:>> thief.
:>>
:>> The fact remains that the three levels of PW on my Thinkpads (power
:>> on, supervisor, HD) ensure that if they are lost or stolen they will
:>> be of little more use to a casual thief than a paperweight.
:>>
:>> ==============
:>> Posted through www.HowToFixComputers.com/bb - free access to hardware troubleshooting newsgroups.
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

Anybody got an answer for this one? Would it work?

Thanks
Don

"M-Tech" <mechtechllc@yahoo.com> wrote in message
news:dZGdndlWH5XKEozcRVn-iA@comcast.com...
> Barry, one question;
>
> If a thief wasn't interested in your data, however, you STILL had a pw on
> the hd, could he magnetically/electrically wipe the drive clean, thus
> removing the pw/data and make the hd useable??? Is there some other
> software that would erase/format/low level etc/ the drive so, again, it
> could at LEAST be used?
>
> Thanks
> Don
>
> "Barry Watzman" <WatzmanNOSPAM@neo.rr.com> wrote in message
> news:410FADED.9040804@neo.rr.com...
>
>
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

I did answer the question. The answer is no, if you don't have the
password (or successfully somehow bypass it), the drive is totally
non-functional. It can't be used at all, for any purpose whatsoever, it
can't even be reformatted. The hard drive password scheme places data
security above absolutely everything else. After a power-up or reset,
the drive is totally non-functional until the proper password is
entered, it isn't even recognized by the bios.


M-Tech wrote:

> Anybody got an answer for this one? Would it work?
>
> Thanks
> Don
>
> "M-Tech" <mechtechllc@yahoo.com> wrote in message
> news:dZGdndlWH5XKEozcRVn-iA@comcast.com...
>
>>Barry, one question;
>>
>>If a thief wasn't interested in your data, however, you STILL had a pw on
>>the hd, could he magnetically/electrically wipe the drive clean, thus
>>removing the pw/data and make the hd useable??? Is there some other
>>software that would erase/format/low level etc/ the drive so, again, it
>>could at LEAST be used?
>>
>>Thanks
>>Don
>>
>>"Barry Watzman" <WatzmanNOSPAM@neo.rr.com> wrote in message
>>news:410FADED.9040804@neo.rr.com...
>>
>>
>
>
>
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

I didn't see your answer....But no one has answered my question. Maybe
there isn't an answer but;

I understand that you cannot access the drive electrically(pw and all
that)...I asked if a electro-mechanical force (like a magnetic field) could
be used to wipe the drive clean. I would "assume" that the pw data is kept
on the HD media?

At that point a low-level format could be used to realign the disc
particles....

IE http://www.periphman.com/degaussing/

Thoughts?

Don



"Barry Watzman" <WatzmanNOSPAM@neo.rr.com> wrote in message
news:4113A3A3.3010202@neo.rr.com...
> I did answer the question. The answer is no, if you don't have the
> password (or successfully somehow bypass it), the drive is totally
> non-functional. It can't be used at all, for any purpose whatsoever, it
> can't even be reformatted. The hard drive password scheme places data
> security above absolutely everything else. After a power-up or reset,
> the drive is totally non-functional until the proper password is
> entered, it isn't even recognized by the bios.
>
>
> M-Tech wrote:
>
> > Anybody got an answer for this one? Would it work?
> >
> > Thanks
> > Don
> >
> > "M-Tech" <mechtechllc@yahoo.com> wrote in message
> > news:dZGdndlWH5XKEozcRVn-iA@comcast.com...
> >
> >>Barry, one question;
> >>
> >>If a thief wasn't interested in your data, however, you STILL had a pw
on
> >>the hd, could he magnetically/electrically wipe the drive clean, thus
> >>removing the pw/data and make the hd useable??? Is there some other
> >>software that would erase/format/low level etc/ the drive so, again, it
> >>could at LEAST be used?
> >>
> >>Thanks
> >>Don
> >>
> >>"Barry Watzman" <WatzmanNOSPAM@neo.rr.com> wrote in message
> >>news:410FADED.9040804@neo.rr.com...
> >>
> >>
> >
> >
> >
>
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

The answer is still no.

Modern hard drives (both desktop and laptop, and even truly modern
floppy drives (e.g. "Zip" drives)) have servo information written on the
platters in addition to the data. The servo information is permanent,
it's written one time at the factory, never subsequently erased, and the
drive itself is incapable of writing it (in fact, it's analog data).

What you suggest would, if it worked, erase the servo information,
effectively destroying the drive.

However, people don't comprehend the strength of magnetic field required
to alther the data (or servo information) on a drive platter.

I doubt if there is any way to erase a platter while it's in a drive,
short of putting the drive into some "extreme" device in a magnetics
lab, or maybe an MRI machine. The force required can only be produced
in the drive because the head is micro-inches from the platter.
Remember that magnetic fields follow the inverse-square law, and any
field originating even just one inch away will be something like 10**12
(a thousand billion) times weaker than the same field produced at the
read head.

Don't forget that the drive motor, and the head seek mechansim, are
inside the drive, and they have powerful magnets and magnetic fields,
yet they don't bother the data. Magnetically, a hard drive is not at
all fragile, in fact it's just about impossible to do magnetic damage to
the platters, even if you try very, very hard. This also implies no
easy way to "bulk erase" the platters although, again, if you did that,
you'd wipe out the servo data, which would destroy the drive anyway.



M-Tech wrote:
> I didn't see your answer....But no one has answered my question. Maybe
> there isn't an answer but;
>
> I understand that you cannot access the drive electrically(pw and all
> that)...I asked if a electro-mechanical force (like a magnetic field) could
> be used to wipe the drive clean. I would "assume" that the pw data is kept
> on the HD media?
>
> At that point a low-level format could be used to realign the disc
> particles....
>
> IE http://www.periphman.com/degaussing/
>
> Thoughts?
>
> Don
>
>
>
> "Barry Watzman" <WatzmanNOSPAM@neo.rr.com> wrote in message
> news:4113A3A3.3010202@neo.rr.com...
>
>>I did answer the question. The answer is no, if you don't have the
>>password (or successfully somehow bypass it), the drive is totally
>>non-functional. It can't be used at all, for any purpose whatsoever, it
>>can't even be reformatted. The hard drive password scheme places data
>>security above absolutely everything else. After a power-up or reset,
>>the drive is totally non-functional until the proper password is
>>entered, it isn't even recognized by the bios.
>>
>>
>>M-Tech wrote:
>>
>>
>>>Anybody got an answer for this one? Would it work?
>>>
>>>Thanks
>>>Don
>>>
>>>"M-Tech" <mechtechllc@yahoo.com> wrote in message
>>>news:dZGdndlWH5XKEozcRVn-iA@comcast.com...
>>>
>>>
>>>>Barry, one question;
>>>>
>>>>If a thief wasn't interested in your data, however, you STILL had a pw
>
> on
>
>>>>the hd, could he magnetically/electrically wipe the drive clean, thus
>>>>removing the pw/data and make the hd useable??? Is there some other
>>>>software that would erase/format/low level etc/ the drive so, again, it
>>>>could at LEAST be used?
>>>>
>>>>Thanks
>>>>Don
>>>>
>>>>"Barry Watzman" <WatzmanNOSPAM@neo.rr.com> wrote in message
>>>>news:410FADED.9040804@neo.rr.com...
>>>>
>>>>
>>>
>>>
>>>
>
>
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

> However, people don't comprehend the strength of magnetic field required
> to alther the data (or servo information) on a drive platter.
>
> I doubt if there is any way to erase a platter while it's in a drive,

Read:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

And you'll see why you'll really, really have to be paying attention
scrubbing data off a HD platter else someone will be able to recover the
data, even after a few erase cycles....
 
G

Guest

Guest
Archived from groups: comp.sys.laptops (More info?)

David Chien <chiendh@uci.edu> wrote:
>
> Read:
> http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
>
> And you'll see why you'll really, really have to be paying
> attention scrubbing data off a HD platter else someone will be able
> to recover the data, even after a few erase cycles....

As recently as five years ago the "standard" for data erasure was a
six-times format of a HD.

Today there is only one acceptable standard in DoD and corporate IT depts.
for securely eliminating data and that's complete destruction of the HD or
other media.

--
Regards,

James

Checkout the NEW Thinkpad Forums: http://forum.thinkpads.com
 

Lollipop Lexie

Distinguished
Jun 4, 2009
1
0
18,510
go back to where you got it from and tell them what happened and ask them to call the company that made the computer, and either you'll have to bring it in to them or they'll have the password saved for you. YOUR WELCOME FOR THE ADVICE!