I remember being 11-12 and just wanting to format my HDD. Well I somehow found & downloaded DBAN then spent fucking 20h nuking it instead of simply reinstalling windows :') Great stuff
I did this exact same thing,I had a laptop that I dual booted,Linux and windows and somehow I deleted the wrong partition and broke grub,and I used this tool
Would this work for a virus on my pc ? I think someone has remote access to my pc because they keep trying to get access to my various accounts that are connected to my Gmail but they somehow can’t fully take over my gmail account bc of the 2 factor so far they changed my steam blizzard and rockstar email but I got steam and rockstar back they seem to only be targeting my gaming accounts
Thanks. I have been using DBAN for so many years and never knew what the name stood for. I was told the reason the disk erase tools may not work on ssd's is the sectors are logically mapped to the physical drive, for load levelling. When you try to write data to all of the sectors it may end up writing to one location multiple times and missing others. I like your show, thanks.
8:36 He's telling the truth, I wasn't wearing safety glasses, I broke my hard drive with a hammer and a piece flew into my eye and I died , now I'm dead and I'm writing this message from hell, there are very hot, they turn off the air conditioners and constantly play Metallica songs, So never break anything with a hammer without wearing safety glasses.
This helped when I was setting up a few computers for my dad's work more than 10 years ago. Installed windows and one of the computers was just slow. Ran boot and nuke for like 3 days and it worked perfectly after.
P.S. DOD 5220.22-m *was* a department of defense manual from *1997* that has been superseded for many years. Don’t use 25 year old regulations to push the “military grade” garbage. This is fine for civilian grade, but not military. NSA guidance supercedes the dod 5220.22-m.
superseded by what? It is still used to my knowledge and is good enough for DoD erasure. I also say that physically destroying the drives is the only way to really erase it. The NSA 130-1 shouldn't be any different when compared to the dod 5220.22-m, except it may be a bit faster.
@@teksyndicate I made two comments and it seems TH-cam removed the other comment as soon as I sent it. NSA Policy Manual 9-12 chapter 17 dated December 2020. The government doesn’t “just wipe” hard drives. The government doesn’t just do “erasure”. The government *requires* degauss or incineration before physical destruction. Software isn’t good enough, and it’s been proven many times as members of the government dropped off computers, printers, and thumb drives with information on them that wasn’t meant for release, and Policy Manual 9-12 gets updated. And when you say “it is still used to your knowledge”, are you actively involved in the sanitization and destruction of storage media for the government, because there is a whole tracking process that is required for the sanitization and destruction, and the people that do it properly are extremely picky. I’m not meaning that as an attack towards you by asking that, because I have followed and enjoyed your channel for a long time now, but 1997 instructions are severely outdated, and this isn’t any more “military grade” than an ASUS or MSI motherboard. It’s just branding, Military loves buying COTS equipment.
If it was good enough for DOD, at any point in time, it's good enough for 99.9% of computer users. And the other 0.1% are just self-important neckbeards.
DBAN 1 pass zero fill is enough for almost every use case. Even for doctor's medical records it'll do... No one is going to spend the money and time required to get that data back. People should stop pretending they're international spies.... No one wants to spend hundreds of thousands of dollars to recover your dick pics.
@@tin2001 never once said anyone was going to spend the time trying to recover anything. You are actually making stuff up just to try and talk, when not one person has even remotely mentioned what you said.
DBAN has been abandoned and now has some issues, plus was not speed optimized and blocked from doing multiple drives at once as that was a partnered enterprise project that did that. However being open source there is an up to date fork with full speed and ability to wipe multiple drives using the same code and interface called NWipe. Like DBAN, NWipe runs on Linux but can be run as a boot or , if you aren't wiping the system drive or you put it into a RAMDisk, as part of an installed Linux OS. Some Linux Distros come with it pre-installed and others you have to install it from a package manager. The easiest way to do it is to either use a distro install disk, go to try it out live, install NWipe if it isn't there and then use it to wipe the hard drives. There is an iso out there that is just a basic boot and run version of NWipe, but it is out of date and has issues in rare cases, so I would avoid that.
DBAN did do multiple drives at once. We had an old PC with 6 SATA and 2 PATA for erasing customer drives. Booted it from an SD card with the write protection switch enabled (to make sure it didn't self-erase), and it was set up to automatically erase all drives.
@@tin2001 You were using a modded or old version then. As soon as Darik was working on EBAN, DBAN could not do simultaneous wiping. Because of it being OS some people modded it in but most versions that did that when we were wiping drives for professional reasons and during my IT training crashed over and over.
You could just boot a Linux live CD and run multiple instances of DBAN under qemu with one drive directly fed into each instance. This would also help with compatibility.
@@tux9656 OK, but NWipe is literally DBAN that you don't have to do all that for. They forked the open source DBAN, updated it, and removed the simultaneous drive limit and speed restrictions. At most all you have to do is stick a Linux Distro Install Drive in, boot, install NWipe, use NWipe. If you already have a bootable distro, it is literally faster than downloading the DBAN ISO and putting it on a USB. And if you have it added to the boot distro.
NOTE! Nwipe/ShredOS is the maintained version of DBAN and fixes many of the bugs and security issues with DBAN. DBAN does not recognise modern devices, it's implementation of Isaac is a huge security risk,
Does ShredOS support for SSD storage? I thought DBAN is only for HDD and will deteriorate SSD lifespan, and so does ShredOS who is based on DBAN too. Thank you.
thx for video. if i wanna make it impossible for someone to recover my data on my harddrive, is it enough to make a clean installation on windows 11 from an usb or do i need to do the above method also?
Great video thanks. I have a related question. I have one of the drive cloners. It has two slots, in one you put a master drive to clone from and in second you put the target drive. What if, in the master i put a blank disk and clone the blank disk onto the drive that I want to "nuke" . Will that work??? I ask because the disk cloner is very fast.
I'm sure youve got an answer by now but just for anyone else, once you use DBAN the drive will be wiped completely. You will need to download windows media creation tool, which can be downloaded from microsoft. Then you will put this file on an empty USB stick and run it, follow the instructions to create a bootable media from the USB stick this is similar to what the Rufus programme does but it will make your USB stick into a windows.iso. Do the same steps to boot from the usb stick as shown in this video and you should be able to install windows now on the wiped drive. If the drive is unformatted youll need to format and partition it, if you look up how to format a drive for windows installation you should be able to find a good video on how to do that
can't open '/proc/cmdline': No such file or directory. I have prepared pendrive several times with different versions. All BIOS security stuff is off, boost legacy only. Doesnt work
This is fix: Nwipe/ShredOS is the maintained version of DBAN and fixes many of the bugs and security issues with DBAN. DBAN does not recognise modern devices, it's implementation of Isaac is a huge security risk,
Still have it on my key chain. Funny how it can make one's bosses nervous, but sometimes I like to be mean by just letting them know it's my "I've had a bad day" disk
I've used this a lot over the years but always got it through the Ultimate Boot CD (UBCD). Tons of other really useful tools on there (like a Windows NT offline password tool).
there are tools for that, since formatting really just resets the tables that say where all the inodes are, it doesn't actually do anything to the data itself.
As for the physical section of the video, why do people like drilling Hard Drives so much? Maybe it's just me but i never bought a drill in my whole life Not everyone have a drill machine, but everyone have something in common: fire. Just DBAN the disk and then burn it I trust fire more than a hole anyways
A guy was selling HDD's at a car boot sale (like a mass yard-sale in a field) They all had drill bits still stuck into the drives.. So be careful with your bits as they might be hard to remove. Drill-bit destroying bits and bytes is dad joke humorous though eh..
Well there's a reasonable amount of recoverable metals in them, so as scrap metal would have some value. But probably not enough to be paying for them individually.
If you've encrypted the entire disk the whole time you've owned it, and then performed this procedure, the only data someone could recover using data forensics is encrypted data. Of course you'll still want to destroy the disk.
99% of people don't need to. It's extremely rare for anyone who finds an old drive to start trying to recover data at all, let alone if it was encrypted or has been erased with a basic zero fill.... Unless you're a spy or serial killer, you don't need to go mental.
If you are sat there watching it, and not doing something else on your pc, then it will be time consuming yes. But there's no need for that, you can do something else on your pc at the same time. As for security, there's no difference mate.
@@jasf1728 Wow, big no. Right off the bat your method has obvious problems. Not every partition is writable, windows won't let you fill up the data partition, and windows quick allocates massive files that reserve space in the OS-- all of which create large chunks of sectors that you can't write over which are just goldmines of untouched space to recover files from the previous OS with But let's ignore all of that and talk about a more interesting reason why: Because operating systems are concerned with performance, they write data in allocation blocks which leave a solid percentage of untouched sectors. When you fill up a previously quick-formatted drive, the odds of recovering a specific file are low for this reason, but it is probabilistically GUARANTEED that MANY files from the previous format can still be recovered, some of which could be incriminating or valuable. Smaller files are far more likely to be recoverable for this reason. This is one of the many examples of why professionals develop the tools in the security space. There are so many things to consider at every level of hardware/software abstraction that it would be insane to use your windows method. Why would you not use the fast, proven tool for the job as Logan suggests?
If I recall, it doesn't support UEFI boot. But there's no requirement to erase a disk on the machine it was installed in. You can pull them out and erase in an older PC. We had a dedicated old machine for this at work - was a 2nd gen i3 machine or similar.
@@tin2001 It does support UEFI boot. You just need to disable secure boot in the bios. It will boot fine on a modern laptop/PC that only supports UEFI.
Nwipe/ShredOS is the maintained version of DBAN and fixes many of the bugs and security issues with DBAN. DBAN does not recognise modern devices, it's implementation of Isaac is a huge security risk,
THis entire video seems silly. Bitlocker the contents. Format it. And be done. DBAN on an SSD not only murders your endurance you can actually recover the data in some cases because of wear leveling / over provisioning.
weird, yesterday I was looking into DBAN and today you posted this video. I recommend to read this, csrc.nist.gov/publications/detail/sp/800-88/rev-1/final
I remember being 11-12 and just wanting to format my HDD.
Well I somehow found & downloaded DBAN then spent fucking 20h nuking it instead of simply reinstalling windows :') Great stuff
I did this exact same thing,I had a laptop that I dual booted,Linux and windows and somehow I deleted the wrong partition and broke grub,and I used this tool
Would this work for a virus on my pc ? I think someone has remote access to my pc because they keep trying to get access to my various accounts that are connected to my Gmail but they somehow can’t fully take over my gmail account bc of the 2 factor so far they changed my steam blizzard and rockstar email but I got steam and rockstar back they seem to only be targeting my gaming accounts
@@javviiiyou could
@@javviiiu got ratt’d
@@OkLarryI simply reset my laptop it seemed to do the trick but I’m not 100 percent sure lol
Should be called Boot Nukem.
If you write your own software , you can name it !! 😂😂😂
Thanks. I have been using DBAN for so many years and never knew what the name stood for. I was told the reason the disk erase tools may not work on ssd's is the sectors are logically mapped to the physical drive, for load levelling. When you try to write data to all of the sectors it may end up writing to one location multiple times and missing others. I like your show, thanks.
8:36 He's telling the truth, I wasn't wearing safety glasses, I broke my hard drive with a hammer and a piece flew into my eye and I died , now I'm dead and I'm writing this message from hell, there are very hot, they turn off the air conditioners and constantly play Metallica songs, So never break anything with a hammer without wearing safety glasses.
Thank you!!! You gave us the stuff START to FINISH for us newbies, or occasionallies. Great job.
This helped when I was setting up a few computers for my dad's work more than 10 years ago. Installed windows and one of the computers was just slow. Ran boot and nuke for like 3 days and it worked perfectly after.
I think your dban tutorial is gold and underrated, really appreciated this!
If you don't subscribe, Logan will tell this HDD that you murdered it's family member, and full armor won't protect you from the HDD wrath.
I tested dban on a drive that had deepfreeze and Stil worked perfectly. Also it is recommended on units with virus too.
P.S. DOD 5220.22-m *was* a department of defense manual from *1997* that has been superseded for many years. Don’t use 25 year old regulations to push the “military grade” garbage.
This is fine for civilian grade, but not military. NSA guidance supercedes the dod 5220.22-m.
superseded by what? It is still used to my knowledge and is good enough for DoD erasure. I also say that physically destroying the drives is the only way to really erase it. The NSA 130-1 shouldn't be any different when compared to the dod 5220.22-m, except it may be a bit faster.
@@teksyndicate I made two comments and it seems TH-cam removed the other comment as soon as I sent it.
NSA Policy Manual 9-12 chapter 17 dated December 2020. The government doesn’t “just wipe” hard drives. The government doesn’t just do “erasure”. The government *requires* degauss or incineration before physical destruction. Software isn’t good enough, and it’s been proven many times as members of the government dropped off computers, printers, and thumb drives with information on them that wasn’t meant for release, and Policy Manual 9-12 gets updated.
And when you say “it is still used to your knowledge”, are you actively involved in the sanitization and destruction of storage media for the government, because there is a whole tracking process that is required for the sanitization and destruction, and the people that do it properly are extremely picky. I’m not meaning that as an attack towards you by asking that, because I have followed and enjoyed your channel for a long time now, but 1997 instructions are severely outdated, and this isn’t any more “military grade” than an ASUS or MSI motherboard. It’s just branding, Military loves buying COTS equipment.
If it was good enough for DOD, at any point in time, it's good enough for 99.9% of computer users. And the other 0.1% are just self-important neckbeards.
DBAN 1 pass zero fill is enough for almost every use case. Even for doctor's medical records it'll do... No one is going to spend the money and time required to get that data back. People should stop pretending they're international spies.... No one wants to spend hundreds of thousands of dollars to recover your dick pics.
@@tin2001 never once said anyone was going to spend the time trying to recover anything. You are actually making stuff up just to try and talk, when not one person has even remotely mentioned what you said.
I’m glad we’re transitioning to solid state storage as they’re more compact and easier to physically destroy than traditional HDDs imo. 🤩🥰👍
How so? The disk inside HDD’s just smash into a million pieces if you give it a good hit
DBAN has been abandoned and now has some issues, plus was not speed optimized and blocked from doing multiple drives at once as that was a partnered enterprise project that did that. However being open source there is an up to date fork with full speed and ability to wipe multiple drives using the same code and interface called NWipe. Like DBAN, NWipe runs on Linux but can be run as a boot or , if you aren't wiping the system drive or you put it into a RAMDisk, as part of an installed Linux OS.
Some Linux Distros come with it pre-installed and others you have to install it from a package manager. The easiest way to do it is to either use a distro install disk, go to try it out live, install NWipe if it isn't there and then use it to wipe the hard drives. There is an iso out there that is just a basic boot and run version of NWipe, but it is out of date and has issues in rare cases, so I would avoid that.
DBAN did do multiple drives at once. We had an old PC with 6 SATA and 2 PATA for erasing customer drives. Booted it from an SD card with the write protection switch enabled (to make sure it didn't self-erase), and it was set up to automatically erase all drives.
@@tin2001 You were using a modded or old version then. As soon as Darik was working on EBAN, DBAN could not do simultaneous wiping. Because of it being OS some people modded it in but most versions that did that when we were wiping drives for professional reasons and during my IT training crashed over and over.
You could just boot a Linux live CD and run multiple instances of DBAN under qemu with one drive directly fed into each instance. This would also help with compatibility.
@@tux9656 OK, but NWipe is literally DBAN that you don't have to do all that for. They forked the open source DBAN, updated it, and removed the simultaneous drive limit and speed restrictions.
At most all you have to do is stick a Linux Distro Install Drive in, boot, install NWipe, use NWipe. If you already have a bootable distro, it is literally faster than downloading the DBAN ISO and putting it on a USB. And if you have it added to the boot distro.
I've been using it for decades and your video was very good.
Thanks for your time and experience.
Peace!
I have been using Parted Magic for some time and it's working like a charm when erasing SSD and NVME
NOTE! Nwipe/ShredOS is the maintained version of DBAN and fixes many of the bugs and security issues with DBAN. DBAN does not recognise modern devices, it's implementation of Isaac is a huge security risk,
Does ShredOS support for SSD storage? I thought DBAN is only for HDD and will deteriorate SSD lifespan, and so does ShredOS who is based on DBAN too. Thank you.
@@ayyget Overwriting is not a safe way to delete data from an SSD disk. Even if overwriting works, it's not worth it.
Great video mate. Congratulations. A question please: While running DBAN program, shall I unplug the flashdisk from the USB gate? Cheers.
no
dd if=/dev/urandom of=/dev/sd[x] -- repeat until thoroughly satisfied that data is completely destroyed.
Obviously don't run this on any drive with contents you wish to keep.
@@MarkParkTech Tah!
From my experience, adding bs=4096 for a HDD or bs=65536 for a SSD can make this process slightly faster.
Hey, just wanted to say THANK YOU very much for making this super easy for me, take it easy, Mike.
thx for video. if i wanna make it impossible for someone to recover my data on my harddrive, is it enough to make a clean installation on windows 11 from an usb or do i need to do the above method also?
I have a computer with Windows OEM software, is it possible to use any of this tools saving the pre installed software?
Great video thanks. I have a related question. I have one of the drive cloners. It has two slots, in one you put a master drive to clone from and in second you put the target drive. What if, in the master i put a blank disk and clone the blank disk onto the drive that I want to "nuke" . Will that work??? I ask because the disk cloner is very fast.
How do I download back windows on the disk after using dban?
I'm sure youve got an answer by now but just for anyone else, once you use DBAN the drive will be wiped completely. You will need to download windows media creation tool, which can be downloaded from microsoft. Then you will put this file on an empty USB stick and run it, follow the instructions to create a bootable media from the USB stick this is similar to what the Rufus programme does but it will make your USB stick into a windows.iso. Do the same steps to boot from the usb stick as shown in this video and you should be able to install windows now on the wiped drive. If the drive is unformatted youll need to format and partition it, if you look up how to format a drive for windows installation you should be able to find a good video on how to do that
At no cost, CCleaner can be download and overwrite any HD or SSD.
can't open '/proc/cmdline': No such file or directory. I have prepared pendrive several times with different versions. All BIOS security stuff is off, boost legacy only. Doesnt work
@@tmoney142 It is exactly what I have did, I have mentioned it in my comment. I have already fixed it somehow, but can't remember how
This is fix: Nwipe/ShredOS is the maintained version of DBAN and fixes many of the bugs and security issues with DBAN. DBAN does not recognise modern devices, it's implementation of Isaac is a huge security risk,
LOL funny ending, loved your info and thanks my man.
Hi do you know of any programs that will erace a emmc on a 5070 wyse thinos by any chance...
awesome tutorial and knowledge keep it going ill keep supporting
Will you do an SSD edition too? (since it requires other steps and Dban is not very useful)
So why does it reload “please select boot device” after trying to load dban
Still have it on my key chain. Funny how it can make one's bosses nervous, but sometimes I like to be mean by just letting them know it's my "I've had a bad day" disk
I've used this a lot over the years but always got it through the Ultimate Boot CD (UBCD). Tons of other really useful tools on there (like a Windows NT offline password tool).
8:39 if you want to sell a computer a multi pass erase procedure would be better than physically destroying the drive 😂😂
How can they recover info if you already format the HDD?
there are tools for that, since formatting really just resets the tables that say where all the inodes are, it doesn't actually do anything to the data itself.
What happened to Bokeys who you recommended. Are they no good now?
I think the moust secure is to put the hdd in a jar with corosive acid (electronics)
Nice one, thanks a lot man. New subscriber ✌🏻
I still have this on disc.
Thanks for the video :)
Problem with DBan is that it’s been out of support for a number of years and won’t work with newer technology such as SSDs. :(
My laptop disconnects from tv and the monitor is dead so this just simply doesn't work for me
As for the physical section of the video, why do people like drilling Hard Drives so much? Maybe it's just me but i never bought a drill in my whole life
Not everyone have a drill machine, but everyone have something in common: fire. Just DBAN the disk and then burn it
I trust fire more than a hole anyways
Would it do the job on an SSD?
I'm here because I need to throw away a closet of old ass computers. I would like to Clinton them.
_"You'll be replacing it!"_
Nice, thanks.
is autonuke safe?
A guy was selling HDD's at a car boot sale (like a mass yard-sale in a field) They all had drill bits still stuck into the drives.. So be careful with your bits as they might be hard to remove. Drill-bit destroying bits and bytes is dad joke humorous though eh..
Why the hell was he selling drives with drill bits stuck in them? Modern art?
@@FlyboyHelosim Just clueless I think..?
@@P5BDeluxeWiFi Sounds like it!
Well there's a reasonable amount of recoverable metals in them, so as scrap metal would have some value. But probably not enough to be paying for them individually.
If you've encrypted the entire disk the whole time you've owned it, and then performed this procedure, the only data someone could recover using data forensics is encrypted data. Of course you'll still want to destroy the disk.
99% of people don't need to. It's extremely rare for anyone who finds an old drive to start trying to recover data at all, let alone if it was encrypted or has been erased with a basic zero fill....
Unless you're a spy or serial killer, you don't need to go mental.
@@tin2001 This video shows how to go overkill, so I was just adding my thoughts to that.
Just format it in windows, then write a load of anything to fill it, then reformat it. That will do the same job.
No. This is more time consuming and far less secure
If you are sat there watching it, and not doing something else on your pc, then it will be time consuming yes. But there's no need for that, you can do something else on your pc at the same time. As for security, there's no difference mate.
@@jasf1728 Wow, big no. Right off the bat your method has obvious problems. Not every partition is writable, windows won't let you fill up the data partition, and windows quick allocates massive files that reserve space in the OS-- all of which create large chunks of sectors that you can't write over which are just goldmines of untouched space to recover files from the previous OS with
But let's ignore all of that and talk about a more interesting reason why:
Because operating systems are concerned with performance, they write data in allocation blocks which leave a solid percentage of untouched sectors. When you fill up a previously quick-formatted drive, the odds of recovering a specific file are low for this reason, but it is probabilistically GUARANTEED that MANY files from the previous format can still be recovered, some of which could be incriminating or valuable. Smaller files are far more likely to be recoverable for this reason.
This is one of the many examples of why professionals develop the tools in the security space. There are so many things to consider at every level of hardware/software abstraction that it would be insane to use your windows method.
Why would you not use the fast, proven tool for the job as Logan suggests?
@@teksyndicate you are absolutely correct
"there's no difference mate." couldn't be further from the truth
I have trouble with DBAN on modern computers. It just doesn't work anymore. I've been using ShredOS with great success.
If I recall, it doesn't support UEFI boot. But there's no requirement to erase a disk on the machine it was installed in. You can pull them out and erase in an older PC. We had a dedicated old machine for this at work - was a 2nd gen i3 machine or similar.
@@tin2001 It does support UEFI boot. You just need to disable secure boot in the bios. It will boot fine on a modern laptop/PC that only supports UEFI.
Nwipe/ShredOS is the maintained version of DBAN and fixes many of the bugs and security issues with DBAN. DBAN does not recognise modern devices, it's implementation of Isaac is a huge security risk,
7:24
It wont boot the usb
I seem to have a knack of destroying things just by dropping. I call it "The Linus Touch"
THis entire video seems silly. Bitlocker the contents. Format it. And be done.
DBAN on an SSD not only murders your endurance you can actually recover the data in some cases because of wear leveling / over provisioning.
Lewis Larry Martinez Gary Williams Richard
all this time i thought it was dericks, not dariks
I just smash the drive. Hammer will suffice.
Get Clinton'd son! :)
how long does it take for a 2tb hdd?
A few firearms channels occasionally use HDDs for testing purposes. If you're going to physically destroy one, "too much" force is never enough.
weird, yesterday I was looking into DBAN and today you posted this video. I recommend to read this, csrc.nist.gov/publications/detail/sp/800-88/rev-1/final