
quick question, once a nuke of the drive is complete. Can you then re-install windows should you desire ? or does it render the HDD pretty much useless

With a HDD just do a full format in Vista or later, it will zero the whole disk.
For an SSD use HDDErase (you can use this on a HDD too but it will take as long as a zero fill).
No need for any boot disks or multiple passes that do NOTHING.
I bet you £1000 you can't recover a single byte from a HDD I zero fill.
I'd bet £10,000 the NSA couldn't either.
Bet you can't either after I dban'd a drive.
Bet I could retrieve data from Vista or later Windows formatted HDD.
A full format in Vista or later zero fills a disk.
If a disk is full of zeros there is nothing else there.
Still want to bet?

I stand corrected(just a couple of google searches) - It would mean that the HDD's I had recovered recently from a Vista build "full" format was clearly not a "full" format, as was described to me.
Although, having used dban personally for awhile now, and having needing to use a multi-pass formatter previously in a couple of jobs, I just have out of habbit always dban'd HDD's that I later sell on or otherwise![]()

Assuming you don't just remove the MFTBut there some applications that I know of, forensic recovery that would probably manage to pull something, but I've never tried them personally(never needed too yet!)
I bet you £1000 you can't recover a single byte from a HDD I zero fill.
I'd bet £10,000 the NSA couldn't either.

Data overwritten once or twice may be recovered by subtracting what is expected to be read from a storage location from what is actually read. Data which is overwritten an arbitrarily large number of times can still be recovered provided that the new data isn't written to the same location as the original data (for magnetic media), or that the recovery attempt is carried out fairly soon after the new data was written (for RAM). For this reason it is effectively impossible to sanitise storage locations by simple overwriting them, no matter how many overwrite passes are made or what data patterns are written. However by using the relatively simple methods presented in this paper the task of an attacker can be made significantly more difficult, if not prohibitively expensive.

Looking at your other posts in this thread you obviously have no idea what you're talking about.
Ever heard of magnetic force microscopy? A sector that has changed from a 1 to a 0 has a totally different magnetic signature than a bit that was always a 0.
Granted the standard consumer won't be able to recover data from a zeroed drive, but to claim that the NSA couldn't is quite frankly, hilarious.
Have a read of this: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
I'll quote the conclusion for you
![]()
Ever heard of magnetic force microscopy? A sector that has changed from a 1 to a 0 has a totally different magnetic signature than a bit that was always a 0.
Granted the standard consumer won't be able to recover data from a zeroed drive, but to claim that the NSA couldn't is quite frankly, hilarious.
Have a read of this: http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html