Thursday, January 01, 2004
 
Step Five: Classified

Fark led me to a set of helpful tips about how to handle giving your old computer to someone else. Here's a summary of what Kim Komando, noted radio computer "expert," suggests as steps or protocols for what you can do to safeguard personal information you might have on the P.C.:
    1. Don't want a big hassle? Give the computer to a trusted employee, friend or family member.

    2. Reformat the hard drive and re-install the operating system.

    3. Buy software and overwrite the disk, again and again and again.

    4. You're totally paranoid, so get out the acetylene torch.
That's it, Komando? That's all you have? What about step 5?

If you don't know what Protocol 5 is, you're not totally paranoid.

I guess not everyone can afford an atom-smasher in the basement.

 
To say Noggle, one first must be able to say the "Nah."