Skip to content

TechRepublic

  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • TechRepublic Premium
  • Top Products Lists
  • Developer
  • 5G
  • Security
  • Cloud
  • Artificial Intelligence
  • Tech & Work
  • Mobility
  • Big Data
  • Innovation
  • Cheat Sheets
  • TechRepublic Academy
  • CES
  • See All Topics
  • Sponsored
  • Newsletters
  • Forums
  • Resource Library
TechRepublic Premium
Join / Sign In
Storage

How to wipe a hard disk with DBAN

By Selena Frye November 11, 2010, 11:28 PM PST

Image
1
of 9

Gallery-DBAN-Zeroing-A-Hard-Disk-With-DBAN-FigA.jpg
Gallery-DBAN-Zeroing-A-Hard-Disk-With-DBAN-FigA.jpg
How to wipe a hard disk with DBAN

Darik's Boot and Nuke tool

Darik's Boot and Nuke tool

Darik’s Boot And Nuke (DBAN) is one of the most popular tools that can be used to wipe a hard drive of all contents. For drives that have contained sensitive data, this is a critical step if the drive is to be sold, returned, or otherwise leaves your possession.

DBAN is a free tool and is distributed as a CD-ROM .ISO image. Download the .ISO image from the DBAN website and write it to an optical disk.

(Click on images to enlarge.)

How to wipe a hard disk with DBAN

DBAN boot menu

DBAN boot menu

Once the CD-ROM is written to a disk, boot the computer from this disk. The DBAN boot menu is shown above. Among the options on this disk, the interactive mode is a good way to get a feel for the task before issuing the wipe.

NOTE: Like other disk wiping tools, DBAN is data-destructive. Use this tool with caution.

How to wipe a hard disk with DBAN

Select a disk for wiping

Select a disk for wiping

DBAN interactive mode allows you select a disk for the wipe operation. In this example, a 146GB hard drive is connected to this system. For safety reasons, I created this gallery example using a virtual machine, and that is why the identified disk is listed as a VMware virtual disk. Press the spacebar to select a disk, which will indicate the “wipe” action in the box next to the disk.

Be careful when using DBAN with RAID arrays or special disk controllers, it may not recognize all disk types.

How to wipe a hard disk with DBAN

Select a method for wiping

Select a method for wiping

One important step for issuing a DBAN command is the method. Pressing [M] will identify the method for the wipe activity. Here, DBAN enumerates the methods that are available for the wipe function. DBAN’s implementation of these standards isn’t guaranteed, but this is a fair trade off for the free price tag.

How to wipe a hard disk with DBAN

Consider level of security needed

Consider level of security needed

The various methods available in DBAN offer various levels of wipes and data erasure security. The Gutmann Wipe implementation on the DBAN boot CD performs 35 different write sequences over the disk. This includes random sequences, all zeroes, all ones, and predefined pattern writes.

Depending on the wipe method selected, the time required will vary widely. Obviously, a 35-sequence wipe operation will take longer than the single-pass Quick Erase option. Factor in also the size of the drive, and these options can take a long time.

How to wipe a hard disk with DBAN

Begin the wipe operation

Begin the wipe operation

From the main stream, the F10 key will issue the command to DBAN to start the wipe operation. A status page is displayed to identify the write throughput rate, runtime, estimated remaining time, and which pass the task is currently on.

How to wipe a hard disk with DBAN

Autonuke

Autonuke

The other main option in using DBAN is to use the Autonuke option on the boot screen. This starts DBAN automatically, and requires the word “autonuke” to be typed on the boot screen. Again as a warning, this step will destroy data on the disk.

How to wipe a hard disk with DBAN

DoD Short Method

DoD Short Method

When the Autonuke mode starts, the enumerated devices are automatically sent the wipe command with the DoD Short Method. This is a triple-pass wipe taking sequences 1, 2, and 7 from the standard DoD 5220.22-M wipe.

How to wipe a hard disk with DBAN

Using commands to begin wipe operation

Using commands to begin wipe operation

Aside from Autonuke and Interactive mode, pressing F3 will show some additional one-liners to enter for a quick start on a wipe task. These include each of the methods available on the disk available as a command to enter from the boot prompt to start a wipe. For example, to select DBAN’s implementation of the DoD 5220.22-M method, simply type “dod” to perform the wipe on all enumerated disks.

What tool do you use for your disk erasure needs and did you see last week’s gallery on >Active@ Kill Disk? Is DBAN the hands-down winner? Share your comments below.?

  • Storage
  • Account Information

    Share with Your Friends

    How to wipe a hard disk with DBAN

    Your email has been sent

Share: How to wipe a hard disk with DBAN
Image of Selena Frye
By Selena Frye
Selena Frye is a former Senior Editor for TechRepublic. Her background is in technical writing, editing, and research. I edit the Data Center, Linux and Open Source, Apple in the Enterprise, and IT Security blogs.
  • Account Information

    Contact Selena Frye

    Your message has been sent

  • |
  • See all of Selena's content

TechRepublic Premium

  • TechRepublic Premium

    Hardware inventory policy

    This policy describes guidelines your organization can follow to track, process and decommission IT equipment. From the policy: SUMMARY An organization’s IT hardware inventory constitutes a significant capital investment in order to perform company operations. Because hardware represents a critical asset and often holds organizational data, it is important for the company to track each ...

    Published:  January 23, 2023, 11:00 AM EST Modified:  January 24, 2023, 11:00 AM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Malware response checklist

    Whether an infection is the result of a disgruntled employee, hardware vulnerability, software-based threat, social engineering penetration, robotic attack or human error, all organizations must be prepared to immediately respond effectively to such an issue if the corresponding damage is to be minimized. Because even the best protected networks become infected, all organizations must have ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 1:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Checklist: Securing Windows 10 systems

    Every operating system should be appropriately secured, especially end user workstations which often contain or permit access to company data and upon which most employee job duties are based. To get the maximum security protection out of your Windows 10 deployments follow this checklist from TechRepublic Premium. Also included in this checklist: Security solutions Product ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 2:00 PM EST Read More See more TechRepublic Premium
  • TechRepublic Premium

    Cloud data storage policy

    Third-party cloud-based file storage applications such as Dropbox, OneDrive and Google Drive have all contributed to the success of business cloud data storage. These products have brought proven flexibility and ease of data access to users and businesses alike while ensuring security of confidential information. Cloud data storage offers many benefits to consumers and companies ...

    Published:  January 22, 2023, 11:00 AM EST Modified:  January 23, 2023, 3:00 PM EST Read More See more TechRepublic Premium

Services

  • About Us
  • Newsletters
  • RSS Feeds
  • Site Map
  • Site Help & Feedback
  • FAQ
  • Advertise
  • Do Not Sell My Information

Explore

  • Downloads
  • TechRepublic Forums
  • Meet the Team
  • TechRepublic Academy
  • TechRepublic Premium
  • Resource Library
  • Photos
  • Videos
  • TechRepublic
  • TechRepublic on Twitter
  • TechRepublic on Facebook
  • TechRepublic on LinkedIn
  • TechRepublic on Flipboard
© 2023 TechnologyAdvice. All rights reserved.
  • Privacy Policy
  • Terms of Use
  • Property of TechnologyAdvice