1. Back that thang up!
The principal thing to do before you part with any bit of hardware is to verify you have duplicates of the information that was on it — particularly data that is troublesome or difficult to supplant, similar to photographs, features, and contacts. In the event that you don't utilize a robotized PC reinforcement administration like Backblaze or Carbonite, you'll need to duplicate records physically (ideally to an outside capacity gadget like a thumb drive or a DVD). On the off chance that you have an Android or iOS gadget, verify you've actuated Google Auto Backup or Apple's iCloud administration; you additionally need to go into your information vault and verify that the documents you need are truly there.
2. Wipe it down.
Try not to expect that whoever gets your old apparatus will expel your information from it; be safe and carry out the employment yourself. Else you could abandon yourself completely open to data fraud. What's more, don't think for one moment that erasing your Documents envelope or notwithstanding reformatting your hard commute is sufficient. A year ago, Intel Security's online master Robert Siciliano purchased 30 utilized PCs through Craigslist and experienced their hard drives with a crime scene investigation master. 50% of the machines that had been reformatted still contained individual information from their past proprietors.
InterConnection.org utilizes Active KillDisk to wipe Windows PCs, which arrives in a freeware form. Macintosh proprietors can utilize the OS X Disk Utility or White Canyon Software's WipeDrive. A processing plant reset ought to be sufficient to secure latest cell phones, gave that you evacuate any SIM cards that could contain individual information, Siciliano says. Be that as it may, to be ultra safe, use Blancco Mobile to wipe Android and iOS telephones.
3. On the off chance that you can't wipe it, crush it.
In case you're not wanting to give or exchange your gadgets, its ideal to just crush any piece of them that contained your information, Siciliano says. For instance, I as of late reused a tablet that was forgetting its energy supply, so there was no real way to turn it on and wipe the circle. Rather I evacuated the hard commute with a screwdriver, ran over the drive with my auto, and afterward took a heavy hammer to it. (Beside securing my own information, it was additionally a considerable measure of fun.)
picture
4. Reuse the right way.
Regardless of the fact that you give or exchange your old apparatus, some or every last bit of it may wind up being reused — and not all recyclers are made equivalent. You need to verify that your e-waste isn't winding up in a landfill or dumped in some Third World nation. The most ideal approach to do that is to ask who does the organization's downstream reusing, and verify its a piece of either the e-Stewards or R2 (Responsible Recycling) certificate programs, which guarantee that all materials are taken care of in an ecologically dependable way.
5. Keep records.
In the event that you give hardware to a school or a charitable, you'll need to tell the IRS so you can recover a touch of something on your assessments. Archive your gift with a receipt, and verify it falls inside Uncle Sam's rules for altruistic giv
apparatus, you'll need to make the accompanying moves to verify your information stays safe and your rigging goes where it should. What's more, no, these steps are not discretionary.
The principal thing to do before you part with any bit of hardware is to verify you have duplicates of the information that was on it — particularly data that is troublesome or difficult to supplant, similar to photographs, features, and contacts. In the event that you don't utilize a robotized PC reinforcement administration like Backblaze or Carbonite, you'll need to duplicate records physically (ideally to an outside capacity gadget like a thumb drive or a DVD). On the off chance that you have an Android or iOS gadget, verify you've actuated Google Auto Backup or Apple's iCloud administration; you additionally need to go into your information vault and verify that the documents you need are truly there.
2. Wipe it down.
Try not to expect that whoever gets your old apparatus will expel your information from it; be safe and carry out the employment yourself. Else you could abandon yourself completely open to data fraud. What's more, don't think for one moment that erasing your Documents envelope or notwithstanding reformatting your hard commute is sufficient. A year ago, Intel Security's online master Robert Siciliano purchased 30 utilized PCs through Craigslist and experienced their hard drives with a crime scene investigation master. 50% of the machines that had been reformatted still contained individual information from their past proprietors.
InterConnection.org utilizes Active KillDisk to wipe Windows PCs, which arrives in a freeware form. Macintosh proprietors can utilize the OS X Disk Utility or White Canyon Software's WipeDrive. A processing plant reset ought to be sufficient to secure latest cell phones, gave that you evacuate any SIM cards that could contain individual information, Siciliano says. Be that as it may, to be ultra safe, use Blancco Mobile to wipe Android and iOS telephones.
3. On the off chance that you can't wipe it, crush it.
In case you're not wanting to give or exchange your gadgets, its ideal to just crush any piece of them that contained your information, Siciliano says. For instance, I as of late reused a tablet that was forgetting its energy supply, so there was no real way to turn it on and wipe the circle. Rather I evacuated the hard commute with a screwdriver, ran over the drive with my auto, and afterward took a heavy hammer to it. (Beside securing my own information, it was additionally a considerable measure of fun.)
picture
4. Reuse the right way.
Regardless of the fact that you give or exchange your old apparatus, some or every last bit of it may wind up being reused — and not all recyclers are made equivalent. You need to verify that your e-waste isn't winding up in a landfill or dumped in some Third World nation. The most ideal approach to do that is to ask who does the organization's downstream reusing, and verify its a piece of either the e-Stewards or R2 (Responsible Recycling) certificate programs, which guarantee that all materials are taken care of in an ecologically dependable way.
5. Keep records.
In the event that you give hardware to a school or a charitable, you'll need to tell the IRS so you can recover a touch of something on your assessments. Archive your gift with a receipt, and verify it falls inside Uncle Sam's rules for altruistic giv
apparatus, you'll need to make the accompanying moves to verify your information stays safe and your rigging goes where it should. What's more, no, these steps are not discretionary.
Aucun commentaire:
Enregistrer un commentaire