Philipp Lehman wrote:
Ivo Wever <[EMAIL PROTECTED]> wrote:
Some people advise to repeat this procedure several times. Can anyone
explain why? I see no reason why one pass doesn't suffice.
[..]
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Thanks for the replies and especially
On Thu, Jun 13, 2002 at 12:21:33PM -0400, Loren Jordan wrote:
> At 10:38 AM 6/13/2002 -0400, Ian D. Stewart wrote:
> >When I was in the (US) Navy, a hard drive that contained classified data
> >wasn't considered clean until after 7 swipes.
>
> There are places that only consider a smoldering pile
At 10:38 AM 6/13/2002 -0400, Ian D. Stewart wrote:
On 2002.06.13 09:16 Jan Johansson wrote:
> I remember reading about a data recovery team that recovered
> files after
> the data had supposedly been removed with a 'dd' command like above.
www.ibas.no they claim to be able to see under 3 layers
On 2002.06.13 09:16 Jan Johansson wrote:
> I remember reading about a data recovery team that recovered
> files after
> the data had supposedly been removed with a 'dd' command like above.
www.ibas.no they claim to be able to see under 3 layers of overwrites.
And since they are a public contract
On Thursday 13 June 2002 14:54, Ivo Wever wrote:
> Some people advise to repeat this procedure several times. Can anyone
> explain why? I see no reason why one pass doesn't suffice.
IIRC, this has to do with minor mis-calibrations of the read/write heads
that may leave tiny traces of the old data
> I remember reading about a data recovery team that recovered
> files after
> the data had supposedly been removed with a 'dd' command like above.
www.ibas.no they claim to be able to see under 3 layers of overwrites. And
since they are a public contractor.. wonder what the not-so-public people
On Thu, Jun 13, 2002 at 02:54:44PM +0200, Ivo Wever wrote:
> Robert Waldner wrote:
> >But, for all practical values, a simple `dd if=dev/urandom bs=1M \
> > of=/dev/hdX` should be quite sufficient.
>
> Some people advise to repeat this procedure several times. Can anyone
> explain why? I see no re
On Thu, 2002-06-13 at 13:54, Ivo Wever wrote:
> >But, for all practical values, a simple `dd if=dev/urandom bs=1M \
> > of=/dev/hdX` should be quite sufficient.
> Some people advise to repeat this procedure several times. Can anyone
> explain why? I see no reason why one pass doesn't suffice.
Dat
Robert Waldner wrote:
Philipp Lehman writes:
>I want to sell an old machine that I don't use any more but there's
>still sensitive stuff like personal emails, gpg keys, and passwords on
>the hdd. What's the recommended way to securely 'shred' this data so
>that it cannot be undeleted by the next
On Thu, Jun 13, 2002 at 01:37:04PM +0200, Philipp Lehman wrote:
> I want to sell an old machine that I don't use any more but there's
> still sensitive stuff like personal emails, gpg keys, and passwords on
> the hdd. What's the recommended way to securely 'shred' this data so
> that it cannot b
> I want to sell an old machine that I don't use any more but there's
> still sensitive stuff like personal emails, gpg keys, and passwords on
> the hdd. What's the recommended way to securely 'shred' this data so
> that it cannot be undeleted by the next owner?
>
> I assume I need to do something
On Thu, 13 Jun 2002 13:37:04 +0200, Philipp Lehman writes:
>I want to sell an old machine that I don't use any more but there's
>still sensitive stuff like personal emails, gpg keys, and passwords on
>the hdd. What's the recommended way to securely 'shred' this data so
>that it cannot be undele
hi ya philip
pick the method best for your paranoia level...
( more paranoia.. --> more time/$$$ to "securely shred" the disks
http://www.Linux-Sec.net/Txt/erase.txt
c ya
alvin
- 100% sure way...
take a hammer... and make itty=bitty pieces of the disks
and than burn it at high
13 matches
Mail list logo