¿A dónde van los archivos BORRADOS?

¿A dónde van los archivos BORRADOS?

Understanding Deletion and Memory

The Concept of Deletion in Computers

  • The speaker introduces the concept of file deletion on a computer, explaining that when a file is deleted, it goes to the recycle bin, which is essentially another folder in the system.
  • If the recycle bin is emptied, the file appears to be permanently deleted; however, questions arise about where it actually goes.

Historical Context of Lost Information

  • The speaker references the Pyramid of Khafre as an example of historical structures that have lost their original appearance over time due to erosion and decay.
  • Only a few ancient wonders remain today; others like the Hanging Gardens of Babylon and the Colossus of Rhodes are lost forever, existing only in art and literature.

Memory and Forgetting

  • The discussion shifts to human memory, particularly childhood amnesia. Children often cannot recall memories from ages 2 to 4 due to underdeveloped brain regions responsible for long-term memory.
  • False memories can occur when individuals believe they remember events based on stories told by others rather than actual experiences.

The Nature of Human Memory

Constructing Memories

  • Every time a memory is recalled, it may be altered or updated based on current thoughts and feelings. This process highlights how memories are not static but dynamic.
  • All memories are somewhat invented or reconstructed each time they are remembered; this leads to variations depending on one's current mindset compared to years prior.

Computer vs. Human Memory

  • A comparison is drawn between human memory processes and computer data storage methods. Understanding how computers remember helps explain how they forget information too.

Data Storage Mechanisms

Digital Image Storage

  • An explanation follows regarding how images are stored digitally through pixels represented by binary values (red, green, blue).

Evolution of Storage Media

  • Various storage media throughout history include floppy disks, CDs, DVDs, USB drives—each storing data as binary code (zeros and ones).

Magnetic vs. Optical Storage

  • Hard drives use magnetism for data storage with stacked platters coated in ferromagnetic material while CDs/DVDs utilize light reflection for reading/writing data.

Advanced Storage Technologies

Solid State Drives (SSDs)

  • SSD technology involves complex mechanisms including electricity and quantum mechanics for storing data within NAND flash memory cells.

Quantum Mechanics in Data Storage

  • Electrons trapped within floating gates represent binary values: trapped electrons signify zero while absence indicates one. This process utilizes quantum tunneling effects for electron movement at atomic levels.

This structured markdown summary captures key insights from the transcript while providing timestamps for easy reference back to specific points discussed.

How is Information Deleted from Storage?

Understanding Data Storage and Deletion

  • The video begins by discussing how information is stored in binary form (zeros and ones) across vast scales, leading to the question of how this information can be deleted.
  • To address the deletion process, the speaker introduces the concept of file systems, which manage how data is organized on storage devices.
  • Each disk's available space is represented as blocks, with each block having a unique hexadecimal address. Files are stored contiguously across these blocks.
  • When files are deleted, gaps or unused blocks remain. This fragmentation complicates storing new files that require contiguous space.
  • A solution involves breaking files into smaller segments to fit into available gaps. A table with pointers helps track where each file starts and its subsequent blocks.

File Systems and Deletion Mechanisms

  • Different operating systems utilize various file systems; for example, Windows uses NTFS, which includes a Master File Table (MFT) to identify all files on a disk.
  • When a file is deleted in NTFS, only a flag indicating "in use" is changed to false, marking it as free for overwriting rather than actually erasing data.
  • The act of emptying the recycle bin merely changes bits from one state to another without truly deleting the underlying data; recovery programs can potentially restore this information.

True Data Deletion Methods

  • For genuine deletion of data from hard drives, methods like demagnetization or physical destruction (e.g., burning the drive) are effective but extreme measures.
  • Overwriting existing data with new information is another method for secure deletion; however, this approach differs significantly when dealing with SSDs due to their unique architecture.

SSD Functionality and Data Management

  • Unlike traditional hard drives that read sequentially, SSDs operate randomly while managing wear-leveling techniques to prolong lifespan by distributing write cycles evenly across memory cells.
  • Writing new data necessitates erasing existing data first on an SSD. This constant writing and erasing can lead to multiple versions of a single file being stored over time.
  • Complete overwriting does not guarantee total erasure since some sectors may remain untouched; thus multiple overwrite cycles (six or seven times recommended) may be necessary for thorough deletion without damaging the drive.

Compression Algorithms and Historical Context

  • The discussion touches upon compression algorithms used in various formats (like JPG vs PNG), highlighting their importance in efficient storage management—an area worthy of further exploration in future videos.
  • Reflecting on technological advancements: In contrast to 1.44 MB floppy disks from the 1980s, modern SSD capacities reach up to 8 TB within compact sizes—illustrating significant progress in storage technology over decades.
Video description

Este video es para tu amigo que piensa que solo con vaciar la papelera se borraron todos esos archivos que si lo llega a ver el FBI lo llevan preso. ETIQUETALO Y MANDALE ESTE VIDEO ------------------------ Redes Sociales: 🤳 TikTok ➞ https://tiktok.com/@eze.martinez.1 📸 Instagram ➞ https://instagram.com/eze.martinez.1/ 🏅 Curso para mejorar tus calificaciones: https://ezemartinez.empretienda.com.ar/general/mejora-tus-notas-curso-completo 🏅 Link para gente que no es de Argentina: https://shop.beacons.ai/ezemartinez/adb579d9-93c4-4be8-a0fd-9c0648a0746a 🏛️ Todas las clases: https://ezemartinez.empretienda.com.ar/ 🏛️ Link para gente que no es de Argentina: https://beacons.ai/ezemartinez 🧠 Material adicional (PDFs) ➞ https://beacons.ai/ezemartinez ------------------------ Referencias: https://en.wikipedia.org/wiki/List_of_destroyed_heritage - Modern Operating Systems (5th Ed.) by Andrew S. Tanenbaum & Herbert Bos (cap. 4) - File System Forensic Analysis (2nd Ed.) by Brian Carrier (cap. 11) Diferencias entre página, bloque y byte: https://www.reddit.com/r/sysadmin/comments/37a8xi/eli5_the_differences_between_a_chunk_page_block/ MFT estructura: https://forensics.wiki/$mft/ https://flatcap.github.io/linux-ntfs/ntfs/concepts/file_record.html