Protecting your confidentiality when disposing of a computing device can be worrisome. Joseph Moran discusses the options .
This obviously presents a major problem when you need to dispose of PCs via sale, donation, or recycling, send equipment in for service or return leased hardware to a vendor (dont forget printers and copiers), or just when reallocating systems within a company. Even if a system isnt going anywhere, the persistence of deleted data, especially if of a sensitive nature, represents a real security risk.
Whatever the scenario, the only way to have any assurance that data you intend to erase is really gone is to overwrite it or wipe it.
Read the rest at eSecurity Planet.