Getting up to date with Windows 8 tools and terminology
A comprehensive collection of articles, videos and more, hand-picked by our editors
How can an operating system be safely removed from a machine?
If you're donating, selling, trading or otherwise disposing of a Windows computer or computers, securely removing the operating system and data while leaving the hardware intact is an important step that's often overlooked.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
You have a couple of options for doing this. The most straightforward and secure method is to use a tool like Active@ KillDisk, which will securely wipe every sector of the drive. You simply download the tool, put the bootable image onto a CD-ROM or USB drive, and then boot your computer and step through the wiping process. This process can take an hour or longer, depending on the speed and size of your hard drive.
Another alternative is to restore the factory image to the computer. You may have this on a CD, or it may be loaded in a special partition on your computer that's accessible via "factory restore" software, which has been installed in Windows. Search through your Programs menu and the image is typically in a folder named after the computer manufacturer.
If you have this software, step through the restoration process and it will remove the partitions (the important part to ensure secure deletion), and then format and reload the operating system back to the factory default.
It doesn't matter whether you have a personal or business computer. You always need to wipe or reload a Windows machine before letting it go. By taking these steps, you can be sure that sensitive OS configuration information (i.e. login passwords, VPN connections and software activation keys) and personal information (i.e. files, search history and passwords cached in Web browsers) are properly kept from curious eyes.
Related Q&A from Kevin Beaver
Knowing how to test for security flaws is vital, but it's a complicated and changing field. Expert Kevin Beaver offers security testing basics.continue reading
How do self-healing networks function? Expert Kevin Beaver looks at the benefits such a network has to offer, as well as the key concepts ...continue reading
While there are numerous security benefits to a DNSSEC implementation, there are drawbacks as well. Expert Kevin Beaver explains.continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.