â€œA group of MVPs have been discussing disk wiping. Could you please provide more details of exactly how your wipe is performed and how it meets NSA/DOD standards?â€ Undelete 2009 uses the following DoD overwrite patterns: 1. Bit pattern #1 = Any Bit Pattern, such as â€˜00110101â€™ 2. Bit Pattern #2 = A Bit pattern that is a Ones compliment of Bit pattern #1. For the above case, it would be â€˜11001010â€™. 3. Bit Pattern #3 = Just a random bit pattern
This site uses Akismet to reduce spam. Learn how your comment data is processed.