I have a table with some sensitive customer data in it. I am now
keeping all the data in another table, and encrypting it. I want to
get rid of the original unencrypted data and be sure that it is no
longer anywhere on disk. Should I drop the table, or first delete the
rows and then clear the transaction log? I'm not sure how to know if
the data is actually physically deleted from disk, or if it's still
there, but just in blocks that get marked as available. Any guidance
would be greatly appreciated.
Thanks,
Bruce 4 3517
Delete the rows, Drop the table. Format the disk 4 times. Drop the disk
onto the floow from a great height.
Bruce wrote: I have a table with some sensitive customer data in it. I am now keeping all the data in another table, and encrypting it. I want to get rid of the original unencrypted data and be sure that it is no longer anywhere on disk. Should I drop the table, or first delete the rows and then clear the transaction log? I'm not sure how to know if the data is actually physically deleted from disk, or if it's still there, but just in blocks that get marked as available. Any guidance would be greatly appreciated.
Thanks, Bruce
Delete the rows, Drop the table. Format the disk 4 times. Drop the disk
onto the floow from a great height.
Bruce wrote: I have a table with some sensitive customer data in it. I am now keeping all the data in another table, and encrypting it. I want to get rid of the original unencrypted data and be sure that it is no longer anywhere on disk. Should I drop the table, or first delete the rows and then clear the transaction log? I'm not sure how to know if the data is actually physically deleted from disk, or if it's still there, but just in blocks that get marked as available. Any guidance would be greatly appreciated.
Thanks, Bruce
Blair Adamache wrote: Delete the rows, Drop the table. Format the disk 4 times. Drop the disk onto the floow from a great height.
A problem could be if there is other data on the disk which should not be
destroyed. :-)
Bruce wrote: I have a table with some sensitive customer data in it. I am now keeping all the data in another table, and encrypting it. I want to get rid of the original unencrypted data and be sure that it is no longer anywhere on disk. Should I drop the table, or first delete the rows and then clear the transaction log? I'm not sure how to know if the data is actually physically deleted from disk, or if it's still there, but just in blocks that get marked as available. Any guidance would be greatly appreciated.
Run an update on the original data, overwriting all sensitive values. For
VARCHARs, you should make sure that the new value is not longer than the
old one so that the records will not be relocated on the disk.
--
Knut Stolze
Information Integration
IBM Germany / University of Jena
Blair Adamache wrote: Delete the rows, Drop the table. Format the disk 4 times. Drop the disk onto the floow from a great height.
A problem could be if there is other data on the disk which should not be
destroyed. :-)
Bruce wrote: I have a table with some sensitive customer data in it. I am now keeping all the data in another table, and encrypting it. I want to get rid of the original unencrypted data and be sure that it is no longer anywhere on disk. Should I drop the table, or first delete the rows and then clear the transaction log? I'm not sure how to know if the data is actually physically deleted from disk, or if it's still there, but just in blocks that get marked as available. Any guidance would be greatly appreciated.
Run an update on the original data, overwriting all sensitive values. For
VARCHARs, you should make sure that the new value is not longer than the
old one so that the records will not be relocated on the disk.
--
Knut Stolze
Information Integration
IBM Germany / University of Jena This thread has been closed and replies have been disabled. Please start a new discussion. Similar topics
by: Pablo |
last post by:
I have a dilemma.
Currently, I may be passing standard text (strings of char) or binary of 1
to 'x' bytes long to a program for comparison with data previously written
to a file. The problem...
|
by: Bruce |
last post by:
I have a table with some sensitive customer data in it. I am now
keeping all the data in another table, and encrypting it. I want to
get rid of the original unencrypted data and be sure that it...
|
by: Mike |
last post by:
Hi All,
I'm writing an application that is accepting data from possibly 100's
of clients. The amount of data I get is around 3 or 4 KB per second
per client. The data that is streamed from the...
|
by: Chris Springer |
last post by:
I'd like to get some feedback on the issue of storing data out to disk and
where to store it. I've never been in a production environment in
programming so you'll have to bear with me...
My...
|
by: noridotjabi |
last post by:
Say I'm writting a program. In this program for some reason I need to
store data somewere were I will be able to access it again. I don't
want to store it in a file because then it could be...
|
by: michael sorens |
last post by:
I have successfully bound an XmlDocument to a DataGridView but all fields
seem to be strings. I want to retrofit appropriate datatypes on some of
the fields. Let me take this in 2 parts.
Part...
|
by: Hermann.Richter |
last post by:
Is there any way to remove automatically all blank chars from the html
sent to the client??
Example:
----------------------------------------------------------------
<?
echo "HTML tags...
|
by: Academia |
last post by:
I have vs2005 installed on the System disk and vs2008 installed on a
different disk.
I want to remove VS2005. I read one time about some problem with
uninstalling vs2005 after vs2008 is...
|
by: arnuld |
last post by:
I have created a program which creates and renames files. I have
described everything in comments. All I have is the
cod-duplication. function like fopen, sprint and fwrite are being called
again...
|
by: taylorcarr |
last post by:
A Canon printer is a smart device known for being advanced, efficient, and reliable. It is designed for home, office, and hybrid workspace use and can also be used for a variety of purposes. However,...
|
by: Charles Arthur |
last post by:
How do i turn on java script on a villaon, callus and itel keypad mobile phone
|
by: aa123db |
last post by:
Variable and constants
Use var or let for variables and const fror constants.
Var foo ='bar';
Let foo ='bar';const baz ='bar';
Functions
function $name$ ($parameters$) {
}
...
|
by: emmanuelkatto |
last post by:
Hi All, I am Emmanuel katto from Uganda. I want to ask what challenges you've faced while migrating a website to cloud.
Please let me know.
Thanks!
Emmanuel
|
by: Hystou |
last post by:
There are some requirements for setting up RAID:
1. The motherboard and BIOS support RAID configuration.
2. The motherboard has 2 or more available SATA protocol SSD/HDD slots (including MSATA, M.2...
|
by: marktang |
last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However,...
|
by: Hystou |
last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can...
|
by: Oralloy |
last post by:
Hello folks,
I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>".
The problem is that using the GNU compilers,...
|
by: jinu1996 |
last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven...
| |