Step Five: Classified

Fark led me to a set of helpful tips about how to handle giving your old computer to someone else. Here’s a summary of what Kim Komando, noted radio computer “expert,” suggests as steps or protocols for what you can do to safeguard personal information you might have on the P.C.:

    1. Don’t want a big hassle? Give the computer to a trusted employee, friend or family member.
    2. Reformat the hard drive and re-install the operating system.
    3. Buy software and overwrite the disk, again and again and again.
    4. You’re totally paranoid, so get out the acetylene torch.

That’s it, Komando? That’s all you have? What about step 5?

If you don’t know what Protocol 5 is, you’re not totally paranoid.

I guess not everyone can afford an atom-smasher in the basement.

Buy My Books!
Buy John Donnelly's Gold Buy The Courtship of Barbara Holt Buy Coffee House Memories