answersLogoWhite

0


Want this question answered?

Be notified when an answer is posted

Add your answer:

Earn +20 pts
Q: How should dead files be destroyed in a secure manner?
Write your answer...
Submit
Still have questions?
magnify glass
imp
Related questions

A user would like to secure files stored on a floppy disk Which file system should they select to format the disk?

NTFS


Can you store two types of files on a secure digital memory card?

Yes.


What is the best protection against computer attacks?

Common sence, don't download any suspicious files and you should be fine. And use chrome browser it is the most secure


Who do you contact to cancel a previous Will?

The testator must collect the original and any copies and then destroy them. If the Will was drafted by an attorney the testator should contact that attorney to notify them that any copy of the Will in their files should be destroyed. A new Will does and should always begin with the statement that the testator "hereby revokes all prior Wills made by me . . . ."The testator must collect the original and any copies and then destroy them. If the Will was drafted by an attorney the testator should contact that attorney to notify them that any copy of the Will in their files should be destroyed. A new Will does and should always begin with the statement that the testator "hereby revokes all prior Wills made by me . . . ."The testator must collect the original and any copies and then destroy them. If the Will was drafted by an attorney the testator should contact that attorney to notify them that any copy of the Will in their files should be destroyed. A new Will does and should always begin with the statement that the testator "hereby revokes all prior Wills made by me . . . ."The testator must collect the original and any copies and then destroy them. If the Will was drafted by an attorney the testator should contact that attorney to notify them that any copy of the Will in their files should be destroyed. A new Will does and should always begin with the statement that the testator "hereby revokes all prior Wills made by me . . . ."


What is Ine in log?

A log in password is a secret word or phrase to secure your files on the computer.


What is a log in password?

A log in password is a secret word or phrase to secure your files on the computer.


What command provides secure copy of files from one Linux machine to another?

SCP (Secure CoPy). It's usually done over SSH.


What does SFTP mean in a network protocol context?

SFTP is a network protocol that gives access to files, transfer of files, and the management function of files over reliable streams of data. SSH File Transfer Protocol was designed by the Internet Engineering Task Force as an extension of the Secure Shell protocol version 2.0 to give files a secure transfer capability.


What is a folder locking software?

Password protect folders is one the mmost reliable and easy ways to lock your files and folders in a secure manner. Try locking your folders with a nice encryption software that also has the feature of password protection like AxCrypt and Data Prtoecto.


What is Secure FTP useful for?

A Secure FTP (File Transfer Protocol) is useful for transferring files from one location to another. i.e. from one server to another. Transferring is secure because the file is encrypted.


File Hosting?

form_title=File Hosting form_header=Share files and images with others via your website with file hosting. What is the average size of the files you will need hosted?=_ What is the total of all the files you will be hosting?=_ Do you need a secure HTTPS server, or will a general connection suit your needs?= () Secure HTTPS server () General connection


How do you secure personnel folders?

Lock them in a file cabinet and shred files instead of throwing them away.