F5F Stay Refreshed Software Operating Systems Windows 10 repair disk issue Recovery partition guidance

Windows 10 repair disk issue Recovery partition guidance

Windows 10 repair disk issue Recovery partition guidance

B
BrainBomber
Member
65
02-06-2016, 04:21 PM
#1
I searched online but wasn’t sure what to look for. Before selling my old PC, I used my old SSD as the main drive in my new one. After upgrading, I formatted the old SSD and put it back in the old PC, then sold it. The issue is that when I tried to format it again, I still saw a 450MB recovery partition and a 100MB EFI partition listed in Disk Management. My question is: could this person have sold me the SSD to help recover my Windows from this device and regain access to my files and emails?
B
BrainBomber
02-06-2016, 04:21 PM #1

I searched online but wasn’t sure what to look for. Before selling my old PC, I used my old SSD as the main drive in my new one. After upgrading, I formatted the old SSD and put it back in the old PC, then sold it. The issue is that when I tried to format it again, I still saw a 450MB recovery partition and a 100MB EFI partition listed in Disk Management. My question is: could this person have sold me the SSD to help recover my Windows from this device and regain access to my files and emails?

J
JoeSuvalle
Member
61
02-08-2016, 07:28 AM
#2
The recovery section simply stores the information Windows requires to restart. He might also employ repair tools to retrieve lost documents from the ssd.
J
JoeSuvalle
02-08-2016, 07:28 AM #2

The recovery section simply stores the information Windows requires to restart. He might also employ repair tools to retrieve lost documents from the ssd.

D
Devies
Member
185
02-08-2016, 01:46 PM
#3
I used a different tool to adjust the formatting. If Windows restricts this, I rely on Linux.
D
Devies
02-08-2016, 01:46 PM #3

I used a different tool to adjust the formatting. If Windows restricts this, I rely on Linux.

G
gxdlike
Member
51
02-15-2016, 02:12 AM
#4
That would be disappointing, but I don’t believe he’ll do that. My focus is more on these recovery partitions—they were generated automatically when I installed Windows. On my old PC, only one partition was created (about 150MB), whereas the new PC has two (450MB plus 100MB). What’s going on with that? By the way, my dad uses Linux, so I initially thought it through, but I ended up in the wrong forum.
G
gxdlike
02-15-2016, 02:12 AM #4

That would be disappointing, but I don’t believe he’ll do that. My focus is more on these recovery partitions—they were generated automatically when I installed Windows. On my old PC, only one partition was created (about 150MB), whereas the new PC has two (450MB plus 100MB). What’s going on with that? By the way, my dad uses Linux, so I initially thought it through, but I ended up in the wrong forum.

C
Clay_PvP
Junior Member
1
02-15-2016, 03:35 AM
#5
Through the recovery section I believe it's not. But it seems the drive was erased quickly, which suggests most information remains intact—it's just prepared for overwriting again. This means basic recovery tools might still have a chance to retrieve files, as long as they don't add much new data. I feel destroying physical mechanical drives is excessive when there are simpler methods to make data nearly impossible to recover, especially if the intent is malicious. CMD: clean /all (wipes all partition and sector data), create partition primary (sets up a fresh partition), format with fs=ntfs (converts it to NTFS and clears sectors). I think even on a traditional hard drive, such an operation would be challenging for anyone trying to steal the data. Is this feasible? I'm unsure. I lack the tools to verify how reliable this approach is compared to destroying a fully working drive. If someone with resources and willingness to try exists, that would be helpful. I don't have recovery software to test it myself.
C
Clay_PvP
02-15-2016, 03:35 AM #5

Through the recovery section I believe it's not. But it seems the drive was erased quickly, which suggests most information remains intact—it's just prepared for overwriting again. This means basic recovery tools might still have a chance to retrieve files, as long as they don't add much new data. I feel destroying physical mechanical drives is excessive when there are simpler methods to make data nearly impossible to recover, especially if the intent is malicious. CMD: clean /all (wipes all partition and sector data), create partition primary (sets up a fresh partition), format with fs=ntfs (converts it to NTFS and clears sectors). I think even on a traditional hard drive, such an operation would be challenging for anyone trying to steal the data. Is this feasible? I'm unsure. I lack the tools to verify how reliable this approach is compared to destroying a fully working drive. If someone with resources and willingness to try exists, that would be helpful. I don't have recovery software to test it myself.