[Info-vax] Price/Value of Used VAX 4000/700

Hans Vlems hvlems at freenet.de
Mon Oct 24 02:23:44 EDT 2011


On Oct 23, 6:18 pm, "Richard B. Gilbert" <rgilber... at comcast.net>
wrote:
> On 10/22/2011 11:28 PM, Howard S Shubs wrote:
>
> > In article<pan.2011.10.21.16.57.15.932... at swbell.net>,
> >   Jim Hopkins<bwana... at swbell.net>  wrote:
>
> >> Thanks to all for the input. I think I will probably just offer to
> >> haul it off after initalizing the disks in their presence to clear
> >> the data, which is probably their main concern. I'll likely have some
> >> hardware questions for the group if and when I get it.
>
> > We'll be here.
>
> Initializing the disk DOES NOT remove any data on the disk.  It does
> make it a little difficult to access the data but it's by no means
> impossible.  What it does do is remove the pointers to the data.
>
> If you want to remove your data, write all ones to every byte in every
> block.  Then right all zeros to every byte in every block.
>
> This WILL NOT stop the CIA or the FBI from recovering data from the
> disk.  If you need to need to prevent access to the data on that level,
> Google for "DOD Erase".
>
> Or bake the disk at 500 degrees Fahrenheit for two hours.  This should
> guarantee that the magnetic domains have all been randomized.
>
> Better yet, don't commit anything secret to disk or tape.

Baking a disk at 500 degrees Fahrenheit very likely demagnetizes the
magnetic coating.
IIRC magnetic materials have an attribute called the Curie temperature
above which the
material (permanently?) looses its magnetic properties. If so, then
your method will both
destroy the data on the disk as well as its usability!
Writing all ones, or all zeroes or any random bit pattern to all
blocks on a disk is not sufficient
then?
Hans



More information about the Info-vax mailing list