I've heard from a security expert that one pass of /dev/random won't be
enough. Seven passes is said to be sufficient that even the most
sophisticated equipment won't be able to recover the data.

Darik's Boot and Nuke runs three passes over the entire hard disk, so
running it three times would be more than enough. Even one run would be
nearly 99% effective, but do it three time if you're ultra paranoid.

regards,
Robert

On Wed, 24 Nov 2004 16:04:43 -0700
Paul E Condon <[EMAIL PROTECTED]> wrote:

> Don't use /dev/random . 
> The entropy pool in the kernel contains only 4096 bits,
> when these are used up, /dev/random blocks. wipe is
> a much better way to go, AND much faster than a blocked
> file transfer.
> 
> The design premiss of wipe is that a thoughtfully designed
> data sequence will remove the remanent magnetization in 
> the skirts of the tracks. Using one pass of /dev/random
> leaves intelligible stuff in the skirts.


-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED] 
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to