Disk data connection chain-based file crushing method
A technology for linking chains and files, applied in the field of information security, can solve problems such as deliberate recovery, doubts about reliability and security, and inability to process data with a secret level, so as to improve efficiency, improve availability and security, Risk reduction effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0026] The present invention will be described in further detail below in conjunction with the accompanying drawings.
[0027] Such as figure 1 A method for shredding files based on a disk data connection chain is provided, the method comprising the following steps:
[0028] Step 1: Find the file allocation table and cluster address pointer through the file to be shredded;
[0029] Step 2: Smash and delete the found file allocation table and cluster address pointer;
[0030] Step 3: Overwrite the free space on the disk.
[0031] In the step 1, the file allocation table represents storage disk file space information, which includes unallocated, allocated or marked as bad disk cluster information; the header of the file allocation table occupies three entries , where the first byte is the disk media specifier, and the second and third bytes are FFFFH set by the system. DOS allocates disk space to files in units of clusters, and each cluster occupies an area in the file alloca...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 