Quick fix: After Reset This PC → Fully clean the drive, verify with Recuva (free recovery tool). Install → scan drive → if no files recoverable: wipe successful. For deeper verification: PhotoRec scans raw sectors. For complete proof: ddrescue image to file + hex view shows zeros. For SSDs: fsutil behavior set DisableDeleteNotify 0 ensures TRIM working.
Reset This PC’s “Fully clean the drive” option securely overwrites. To verify: run forensic recovery tools after. Few or no recoverable files = successful wipe.
Affects: Windows 11.
Fix time: ~30 minutes.
What causes this need
For disposing / reselling PC: ensure data unrecoverable. Reset This PC offers Fully clean option; verify it worked. Especially important for: corporate compliance, sensitive personal data, legal requirements.
Method 1: Use Recuva to test recoverability
The standard route.
- After Reset This PC + Fully clean: boot fresh Windows.
- Install Recuva (free, by Piriform) from ccleaner.com/recuva.
- Run.
- Pick drive that was wiped (usually C: or specific letter).
- Pick file types: all.
- Tick Enable Deep Scan.
- Click Start.
- Wait. Scan time: 30 min to several hours.
- Results show recoverable files (if any).
- For Fully clean: should show very few or random / corrupt files.
- For Just remove my files: shows lots of recoverable.
- For comparison: a fully-wiped drive should show < 100 recoverable items (file system metadata).
This is the standard verification.
Method 2: PhotoRec for deeper scan
For thorough verification.
- Download TestDisk / PhotoRec (free, open source).
- PhotoRec scans raw disk sectors for file signatures (independent of file system).
- Boot from Linux Live USB.
- Open Terminal. Run
sudo photorec. - Pick the drive (carefully — PhotoRec lists raw devices).
- Pick file types to recover (or all).
- Specify output directory.
- Scan runs. Recovers files based on signatures.
- For Fully clean: very few results.
- For random data wipe: PhotoRec may find no file-signature matches.
- For chronic concern: physical destruction (drill, shredder) for ultimate security.
This is the deeper route.
Method 3: Hex inspect sectors
For absolute proof.
- Boot Linux Live USB.
- Read disk sectors directly:
sudo dd if=/dev/sdX bs=1M count=100 status=progress | xxd | headReads first 100MB, displays as hex.
- For Fully clean: should be mostly zeros (0x00) or random data after wipe.
- For not wiped: visible patterns, possibly readable strings (filenames, content).
- For random samples:
dd if=/dev/sdX bs=1M skip=10000 count=1 | xxd | head— read 10GB in. - For SSDs after TRIM: random data sectors common. Wipe may show zeros.
- For verifying TRIM:
fsutil behavior query DisableDeleteNotify. Result 0 = TRIM on, ideal. - For chronic verification: combine all three methods for confidence.
This is the hex route.
How to verify the fix worked
- Recuva: shows minimal recoverable files (under 50).
- PhotoRec: few or no signature matches.
- Hex inspection: sectors mostly zero or random.
- For thorough wipe: completely unreadable to forensic tools.
If none of these work
If files still recoverable: Quick wipe used: re-do Reset This PC → pick Fully clean. For SSDs: TRIM should handle; may need vendor Secure Erase command. For wear-leveled spare sectors: SSDs have over-provisioned space. Random data may persist there. ATA Secure Erase wipes everything. For chronic concern: physical destruction. Drill 6-8 holes through drive. Then dispose. For corporate compliance: certified erasure tools (Blancco, Smart Hard Disk Eraser). For environmentally responsible disposal: certified e-waste recycler. Documentation. For RAID arrays: wipe each disk separately.
Bottom line: Run Recuva after wipe to test. Few or no recoverable = wipe successful. PhotoRec for deeper. Hex inspect sectors via dd for absolute proof. For SSDs: ensure TRIM is on, or use vendor Secure Erase.