tag:blogger.com,1999:blog-8377446.post6747476335863124091..comments2024-03-29T10:48:06.521+00:00Comments on Nanny Knows Best: Nanny Shuts Down DatabaseKen Frosthttp://www.blogger.com/profile/13568488818950912374noreply@blogger.comBlogger7125tag:blogger.com,1999:blog-8377446.post-19814582459042577282010-08-10T10:15:51.304+01:002010-08-10T10:15:51.304+01:00Contactpoint, the children's database, may hav...Contactpoint, the children's database, may have been shut down, but the power to establish it is enshrined in S12 of the Children Act 2004. It has not been repealed and it is unlikely that it will be.<br /><br />"The price of freedom is eternal vigilance."Anonymousnoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-6950652654480479522010-08-06T20:35:08.379+01:002010-08-06T20:35:08.379+01:00Perhaps Nanny should ask for some advice from Aunt...Perhaps Nanny should ask for some advice from Auntie.<br /><br />http://news.bbc.co.uk/1/hi/programmes/click_online/8708074.stmAnonymousnoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-73339546021174758672010-08-06T15:15:36.901+01:002010-08-06T15:15:36.901+01:00Forensic techniques??????
Electron fucking microsc...Forensic techniques??????<br />Electron fucking microscopes?????<br /><br />It's just a glorified address book filled with inaccuracies.<br /><br />Here's an idea....Hold down Ctrl, right click the file....Select 'Delete'.<br /><br />Now behave yourselves!Garyhttp://www.campoamorgolf.infonoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-13512303181624752512010-08-06T15:06:45.978+01:002010-08-06T15:06:45.978+01:00I believe the official government method for dispo...I believe the official government method for disposing of sensitive data is to copy the contents onto a laptop and leave it on a train.<br /><br />Even so, hurrah!! :)Mr Potato Headhttp://www.checkmystory.co.uknoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-26948589144771650592010-08-06T12:55:19.983+01:002010-08-06T12:55:19.983+01:00I think you'll find that even after multiple p...I think you'll find that even after multiple passes of random data the latest forensic techniques can still recover information. The read/write heads never pass in exactly the same place, and the tiny bits left at the edge can be read, and the data reconstructed. <br /><br />Even smashing the disk isn't a guarantee, as the remaining bits can be examined by electron microscope!<br /><br />I think the only totally secure method is to have the entire hard drive ground up in to very fine particles, I remember seeing a company advertising just such a service recently.<br /><br />Encrypting the disc is obviously a wise move, but the people behind this operation will know the key, and in any case given the governments dismal record, can we be sure that such methods were employed?microdavenoreply@blogger.comtag:blogger.com,1999:blog-8377446.post-35975624762878027712010-08-06T11:19:19.386+01:002010-08-06T11:19:19.386+01:00Microsoft Access.......£150
File Encryption Softwa...Microsoft Access.......£150<br />File Encryption Software....£25<br />All that lovely information...Priceless.<br /><br />For everything else...There's common sense.<br /><br />I do hope they do destroy both the database, as well as the information contained therein....I am always a little sceptical when Nanny says she will hand back power or destroy information; information is power and, in my opinion, Nanny always struggles to lessen her level of information or power she holds over us...I wonder if each local Nanny will keep the old information on a local database? I would not be surprised if she did.....As I say, I personally can't see Nanny just destroying all that data.<br /><br /><br /><br />Hi-Viz...Just say NO!!!!!!<br /><br />Just laugh at Hi-Viz!!!!!!Tonk.noreply@blogger.comtag:blogger.com,1999:blog-8377446.post-38733294151414988262010-08-06T10:52:15.539+01:002010-08-06T10:52:15.539+01:00"By they way, the best way to actually destro..."By they way, the best way to actually destroy a hard disc (in order to ensure that it is never read) is to take a hammer to it!"<br /><br />I worked for the dreaded HMCE for a while. The actual approved method of disposing of sensitive data is to overwrite the disk several times with random numbers..THEN take a hammer to it!<br /><br />...never actually heard of it being done though!Anonymousnoreply@blogger.com