{"id":16622,"date":"2022-09-07T11:17:19","date_gmt":"2022-09-07T05:47:19","guid":{"rendered":"https:\/\/www.stellarinfo.co.in\/blog\/?p=16622"},"modified":"2023-01-02T15:12:49","modified_gmt":"2023-01-02T09:42:49","slug":"how-to-wipe-hard-drive-with-nist-800-88-compatible-software","status":"publish","type":"post","link":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/","title":{"rendered":"How To Wipe Hard Drive With NIST 800-88 Compatible Software?"},"content":{"rendered":"<table style=\"border: 2px dashed #eeeeee; height: 105px;\" width=\"813\">\n<tbody>\n<tr>\n<th style=\"background-color: #eee; text-align: justify;\"><em><strong>Summary: Data sanitization is now at the top of the list of most CIOs, at par with malware intrusion. You need NIST 800-88 compliant software to ensure data does not fall into wrong hands.<\/strong><\/em><\/th>\n<\/tr>\n<tr>\n<th>\n<p style=\"text-align: center;\"><a class=\"btn btn-lg btn-primary mr-sm-2\" href=\"https:\/\/www.stellarinfo.co.in\/bitraser\/ppc\/drive-erasure.php?utm_source=Blog-Post&amp;utm_medium=Request-A-Callback&amp;utm_campaign=Blog-Post-BitRaser\" target=\"_blank\" rel=\"noopener noreferrer\">Request A Call Back<\/a><\/p>\n<\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"text-align: justify;\">Every organization needs more storage. And with that, they need better processes to secure their data when in use and wipe their data when it\u2019s not required anymore. Data that used to be securely stored on company servers now finds its way to individual laptops and smart devices due to the increasing use of cloud-based applications.<\/p>\n<p style=\"text-align: justify;\">Research by <a href=\"https:\/\/www.ponemon.org\/research\/ponemon-library\/\" target=\"_blank\" rel=\"nofollow noopener\">Ponemon Institute<\/a>, a premier research institute out of Michigan that is dedicated to privacy and investigation of data breaches, has found that in 2021 data breaches cost businesses over $4 million on average. Further, of the one thousand CIOs interviewed, 60% had suffered data breaches due to third-party service providers.<\/p>\n<p style=\"text-align: justify;\"><strong>Table of Contents<\/strong><\/p>\n<ol>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#srv1\">Understanding NIST 800-88<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#srv2\">NIST Compliance Requirements<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#srv3\">Cutting Edge Data Erasure Technology<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#srv4\">How to Install BitRaser?<\/a><\/li>\n<li style=\"text-align: justify;\"><a href=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#srv5\">Don&#8217;t Ignore Sanitization<\/a><\/li>\n<\/ol>\n<h2 id=\"srv1\">What is NIST 800-88?<\/h2>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/www.nist.gov\/\" target=\"_blank\" rel=\"noopener\">NIST<\/a> stands for National Institute for Standards and Technology. It is a physical sciences laboratory that is run by the US Department of Commerce.\u00a0Previously, NIST was known as the Bureau of Standards.<\/p>\n<p style=\"text-align: justify;\"><a href=\"https:\/\/nvlpubs.nist.gov\/nistpubs\/Legacy\/SP\/nistspecialpublication800-100.pdf\" target=\"_blank\" rel=\"noopener\">NIST 800-88<\/a> is a guideline for data sanitization published in 2006 and has become the de facto standard globally.\u00a0The objective of NIST 800-88 is to render data on the targeted device irretrievable.<\/p>\n<p style=\"text-align: justify;\">The guidelines issued by NIST 800-88 cover all types of storage media including floppy discs, optical discs (CD\/DVD), HDD, and SSD, and use <a href=\"https:\/\/www.stellarinfo.co.in\/kb\/difference-between-purge-clear-and-destroy.php\" target=\"_blank\" rel=\"noopener\">Clear, Purge and Destroy<\/a> as a three-pronged approach.<\/p>\n<p style=\"text-align: justify;\"><strong>Clear<\/strong><\/p>\n<p style=\"text-align: justify;\">Clear overwrites data with 0 and 1. It is used with HDD, SSD, and other flash-based media (USB, memory card).\u00a0<strong>NIST Clear data wiping software<\/strong> offers moderate protection against intrusion. It allows the media to be reused without any trouble.<\/p>\n<p style=\"text-align: justify;\"><strong>Purge<\/strong><\/p>\n<p style=\"text-align: justify;\">Purge includes logical techniques for state-of-the-art overwriting and block erasure as well as deep erasure using cryptographic means. It is used with HDD, SSD, and other flash-based media (USB, memory card).<\/p>\n<p style=\"text-align: justify;\">A<strong> NIST Purge data wiping tool<\/strong> offers a high level of protection against intrusion. It also allows easy reuse of storage media.<\/p>\n<p style=\"text-align: justify;\"><strong>Destroy<\/strong><\/p>\n<p style=\"text-align: justify;\">The use of physical techniques such as pulverizing, shredding, and smelting render storage media unusable.\u00a0It is the most secure. Clear and Purge cannot be used with optical media but Destroy renders it non-working.<\/p>\n<p style=\"text-align: justify;\">The storage media cannot be reused, but to some extent recycling of materials is possible.<\/p>\n<h2 id=\"srv2\">NIST Compliance Requirements for Data Erasure Software<\/h2>\n<p style=\"text-align: justify;\">The first point to note is that NIST does not conduct any validating exercise. It only sets out the standard for data sanitization and conducts testing.\u00a0<strong>NIST 800-88 compliant software<\/strong> has to adhere to the guidelines set out in the document.<\/p>\n<p style=\"text-align: justify;\">These are the salient points of NIST 800-88 Standard:<\/p>\n<p style=\"text-align: justify;\">(page 20-22 of NIST 800-88r1)<\/p>\n<ol style=\"text-align: justify;\">\n<li>Overwriting with binary 0s in a single pass is considered satisfactory.<\/li>\n<li>Multiple passes may be used but they significantly reduce the lifespan of media.<\/li>\n<li>Cryptographic erase through TCG Opal SSC or Enterprise SSC interface.<\/li>\n<li>Though NIST acknowledges, and research shows that some signal remains, it is too feeble to be recovered.<\/li>\n<li>Verifying the sanitization is essential. Full verification of every bit is impossible so sample regions have to be tested.<\/li>\n<li>The software has to conceptually break up the media into subsections. A sufficient number of these subsections have to be tested so as to cover the entire addressable space.<\/li>\n<li>At least two locations in each subsection must be verified, e.g. say the media is split into 500 subsections each 250 MB. Then two from the first 250 MB, followed by two from the second 250 MB, and so on, must be verified.<\/li>\n<li>Each sample location must be at least 5% of the subsection and not overlap with the other location in the same subsection. In a subsection of 250 MB, each location must be at least 12.5 MB in size and at least a total of 25 MB of that subsection must be checked.<\/li>\n<li>Thus, a verification must cover at least 10% of the entire space on the media.<\/li>\n<li>The first and last addressable location is always included in the verification.<\/li>\n<li>The NIST 800-88 compliant software must produce automatic documentation containing<\/li>\n<\/ol>\n<ul style=\"text-align: justify;\">\n<li>Manufacturer<\/li>\n<li>Model<\/li>\n<li>Serial number<\/li>\n<li>The owner assigned part number if any<\/li>\n<li>Type of media<\/li>\n<li>Source<\/li>\n<li>Details of Clear and Purge operation<\/li>\n<li>Tool used<\/li>\n<li>Verification method<\/li>\n<li>Name of operator<\/li>\n<li>Designation<\/li>\n<li>Date and time<\/li>\n<\/ul>\n<h2 id=\"srv3\">BitRaser &#8211; Cutting Edge Data Erasure Technology<\/h2>\n<p style=\"text-align: justify;\">In Oct 2020, <a href=\"https:\/\/www.dhs.gov\/sites\/default\/files\/publications\/testresults_for_bitraser_version3_0.pdf\" target=\"_blank\" rel=\"nofollow noopener\">NIST formally tested BitRaser<\/a> on an HDD and SSD using CFTT Suite. As expected, the outcome was most satisfactory.\u00a0 If you want to prevent data leakage, then BitRaser must be the <strong>NIST 800-88 compliant software<\/strong> of choice.<\/p>\n<p style=\"text-align: justify;\">Features of BitRaser:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Erases data from desktop, laptop, server mounted drives.<\/li>\n<li>Can erase 32 drives simultaneously at high speed.<\/li>\n<li>Works with all major drive interfaces\u2014SATA, PATA, USB, FireWire, PCI, NVME, M.2, SCSI, etc.<\/li>\n<li>Compliant with 24 major international standards such as NIST 800-88, DOD 5220.22, HMG IS5, and more.<\/li>\n<li>Securely erases HPA and DCO areas of a drive.<\/li>\n<li>Supports multiple block sizes.<\/li>\n<li>Works over the internet and Wi-Fi.<\/li>\n<li>Works on 32 and 64-bit machines.<\/li>\n<li>Boots from USB to BIOS and UEFI.<\/li>\n<li>Secure communication with AES security.<\/li>\n<li>Allows HexViewer verification of media.<\/li>\n<li>Offers one-click wiping.<\/li>\n<li>Cloud-based console for report generation and storage.<\/li>\n<li>Generates secure and tamper-proof reports.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16630 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-Summary.png\" alt=\"BitRaser Data Eraser Report\" width=\"588\" height=\"409\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-Summary.png 588w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-Summary-300x209.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-Summary-150x104.png 150w\" sizes=\"auto, (max-width: 588px) 100vw, 588px\" \/><\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-16631 size-full\" src=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-summary-2.png\" alt=\"Data Eraser Report\" width=\"607\" height=\"437\" srcset=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-summary-2.png 607w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-summary-2-300x216.png 300w, https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Bitraser-summary-2-150x108.png 150w\" sizes=\"auto, (max-width: 607px) 100vw, 607px\" \/><\/p>\n<h2 id=\"srv4\">How to Deploy BitRaser?<\/h2>\n<p style=\"text-align: justify;\">Data cannot be deleted while the drive is operational. But booting a PC activates the drive.\u00a0That is why BitRaser downloads to a USB.<\/p>\n<ul style=\"text-align: justify;\">\n<li>Create Bootable Drive<\/li>\n<li>Boot from the USB<\/li>\n<li>Erase using the standard of preference<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">It is as simple as that.<\/p>\n<p style=\"text-align: justify;\">In the end, BitRaser would generate a detailed <a href=\"https:\/\/www.stellarinfo.co.in\/pdf\/BitRaser-Sample-Report.pdf\" target=\"_blank\" rel=\"noopener\">data eraser report<\/a> about the drive erasure.<\/p>\n<p style=\"text-align: justify;\"><strong>Who should use BitRaser?<\/strong><\/p>\n<ul style=\"text-align: justify;\">\n<li>Enterprise<\/li>\n<li>Small and medium businesses<\/li>\n<li>Governments<\/li>\n<li>ITAD and seller of refurbished devices<\/li>\n<li>Individuals<\/li>\n<\/ul>\n<h2 id=\"srv5\">Data Sanitization Cannot be Ignored<\/h2>\n<p style=\"text-align: justify;\">Whether you are an at-home developer working freelance gigs or a Fortune 500 company, there are severe repercussions to data leakage. You could be held liable for damages. Worse than that, your professional reputation would be ruined.<\/p>\n<p style=\"text-align: justify;\">Therefore, before you dispose of IT assets perform a check:<\/p>\n<ul style=\"text-align: justify;\">\n<li>Is it storage media (HDD, memory card) or data passive (motherboard, ROM)?<\/li>\n<li>If it is the former, has it ever contained sensitive data (address, passwords, research details, and so on)?<\/li>\n<li>If yes, then you have to employ robust <strong>NIST 800-88 compliant software<\/strong> such as BitRaser to cleanse it.<\/li>\n<\/ul>\n<p style=\"text-align: justify;\">We will be glad to clarify any questions you might have about our product. Please give us a call or visit our website today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary: Data sanitization is now at the top of the list of most CIOs, at par with malware intrusion. You need NIST 800-88 compliant software to ensure data does not fall into wrong hands. Request A Call Back Every organization needs more storage. And with that, they need better processes to secure their data when [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":16665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[193],"tags":[],"class_list":["post-16622","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-drive-eraser","has_thumb"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Wipe Hard Drive With NIST 800-88 Compatible Software<\/title>\n<meta name=\"description\" content=\"If you want to prevent data leakage, then BitRaser must be the NIST 800-88 compliant software of choice. Salient points of NIST 800-88 Standard are:\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Wipe Hard Drive With NIST 800-88 Compatible Software\" \/>\n<meta property=\"og:description\" content=\"If you want to prevent data leakage, then BitRaser must be the NIST 800-88 compliant software of choice. Salient points of NIST 800-88 Standard are:\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/\" \/>\n<meta property=\"og:site_name\" content=\"Stellar Data Recovery Blog - Tips and Solutions\" \/>\n<meta property=\"article:published_time\" content=\"2022-09-07T05:47:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-02T09:42:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Wipe-Hard-Drive-With-NIST-800-88-Compatible-Software.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Girish\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Girish\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wipe Hard Drive With NIST 800-88 Compatible Software","description":"If you want to prevent data leakage, then BitRaser must be the NIST 800-88 compliant software of choice. Salient points of NIST 800-88 Standard are:","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/","og_locale":"en_GB","og_type":"article","og_title":"Wipe Hard Drive With NIST 800-88 Compatible Software","og_description":"If you want to prevent data leakage, then BitRaser must be the NIST 800-88 compliant software of choice. Salient points of NIST 800-88 Standard are:","og_url":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/","og_site_name":"Stellar Data Recovery Blog - Tips and Solutions","article_published_time":"2022-09-07T05:47:19+00:00","article_modified_time":"2023-01-02T09:42:49+00:00","og_image":[{"width":1000,"height":600,"url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Wipe-Hard-Drive-With-NIST-800-88-Compatible-Software.jpg","type":"image\/jpeg"}],"author":"Girish","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Girish","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#article","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/"},"author":{"name":"Girish","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/0200f068dc76e3a44f8510d280528bba"},"headline":"How To Wipe Hard Drive With NIST 800-88 Compatible Software?","datePublished":"2022-09-07T05:47:19+00:00","dateModified":"2023-01-02T09:42:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/"},"wordCount":1088,"commentCount":0,"publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Wipe-Hard-Drive-With-NIST-800-88-Compatible-Software.jpg","articleSection":["Drive Eraser"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/","name":"Wipe Hard Drive With NIST 800-88 Compatible Software","isPartOf":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#primaryimage"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#primaryimage"},"thumbnailUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Wipe-Hard-Drive-With-NIST-800-88-Compatible-Software.jpg","datePublished":"2022-09-07T05:47:19+00:00","dateModified":"2023-01-02T09:42:49+00:00","description":"If you want to prevent data leakage, then BitRaser must be the NIST 800-88 compliant software of choice. Salient points of NIST 800-88 Standard are:","breadcrumb":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#primaryimage","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Wipe-Hard-Drive-With-NIST-800-88-Compatible-Software.jpg","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2022\/09\/Wipe-Hard-Drive-With-NIST-800-88-Compatible-Software.jpg","width":1000,"height":600,"caption":"Wipe Hard Drive"},{"@type":"BreadcrumbList","@id":"https:\/\/www.stellarinfo.co.in\/blog\/how-to-wipe-hard-drive-with-nist-800-88-compatible-software\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.stellarinfo.co.in\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Wipe Hard Drive With NIST 800-88 Compatible Software?"}]},{"@type":"WebSite","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#website","url":"https:\/\/www.stellarinfo.co.in\/blog\/","name":"Stellar Data Recovery Blog - Tips and Solutions","description":"","publisher":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.stellarinfo.co.in\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#organization","name":"Stellar Data Recovery","url":"https:\/\/www.stellarinfo.co.in\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","contentUrl":"https:\/\/www.stellarinfo.co.in\/blog\/wp-content\/uploads\/2020\/07\/stellar-data-recovery-logo.png","width":181,"height":52,"caption":"Stellar Data Recovery"},"image":{"@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/0200f068dc76e3a44f8510d280528bba","name":"Girish","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.stellarinfo.co.in\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c43aa311fe399b0e1b0c69ba4891a73e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c43aa311fe399b0e1b0c69ba4891a73e?s=96&d=mm&r=g","caption":"Girish"},"description":"Girish is a blogger and writer. He has over 6 years of experience in Data Recovery and Data Eraser technology. In his free time, he writes about technical tips and tutorials.","url":"https:\/\/www.stellarinfo.co.in\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/16622","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/comments?post=16622"}],"version-history":[{"count":1,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/16622\/revisions"}],"predecessor-version":[{"id":18034,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/posts\/16622\/revisions\/18034"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media\/16665"}],"wp:attachment":[{"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/media?parent=16622"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/categories?post=16622"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.stellarinfo.co.in\/blog\/wp-json\/wp\/v2\/tags?post=16622"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}