Routers and Firewalls
Operating System Security
Passwords & Password Managers
Secure the Human (SANS)
Free Online Virus Scanners
Encryption & Anti-Keyloggers
Anti-theft & Laptop Recovery
Popular Open Source Software
Secure Email | VPN Services | Secure Browsers
Mobile Computing & Security Apps
Blogs & Podcasts
Like us on Facebook
Disclaimer on links.
This page will contain links to some of the resources we used when researching our book
Cybersecurity for Everyone
. The web sites are not under the control of the author, and the author is not responsible for the contents of any website, including without limitation any link contained in a referenced web, or any changes or updates to a referenced website. The author is not responsible for webcasting or any other form of transmission received from any referenced web site. The author is providing these links to you only as a convenience, and the inclusion of any link does not imply endorsement by the author of the site or any association with its operators.
Websites and software related to physical security listed in our book Cybersecurity for Everyone
nwipe(1): securely erase disks - Linux man page
nwipe is a command that will securely erase disks using a variety of recognised methods. It is a fork of the dwipe command used by Darik's Boot and Nuke ...
Blancco - Pioneer in Certified Data Erasure
shred(1) - Linux man page
Overwrite the specified FILE(s) repeatedly, in order to make it harder for even very expensive hardware probing to recover the data.
Darik's Boot And Nuke | Hard Drive Disk Wipe and Data Clearing
Center for Magnetic Recording Research. Secure Erase.
Tutorial on Disk Drive Data Sanitization.
Center for Magnetic Recording Research. HDDErase.exe User Guide.
Keeping your confidential data secure during hardware repair - Apple Support
Some product repairs may involve replacing your computer's hard drive, and some may not. If your hard drive contains sensitive or confidential data, read on for some suggestions on how to keep that data secure.