From the earliest beginnings of computer usage the issue of how to prevent private or sensitive information from being recovered has been discussed. People used to be careful about putting files of this sort into the recycle bin, then emptying the recycle bin. It has become more apparent now though that is procedure does not […]