Step Five: Classified
Fark led me to a
set of helpful tips about how to handle giving your old computer to someone else. Here's a summary of what Kim Komando, noted radio computer "expert," suggests as steps or protocols for what you can do to safeguard personal information you might have on the P.C.:
- Don't want a big hassle? Give the computer to a trusted employee, friend or family member.
- Reformat the hard drive and re-install the operating system.
- Buy software and overwrite the disk, again and again and again.
- You're totally paranoid, so get out the acetylene torch.
That's it, Komando? That's all you have? What about step 5?
If you don't know what Protocol 5 is, you're not
totally paranoid.
I guess not everyone can afford an atom-smasher in the basement.