Re: Floppy recovery

2016-01-07 Thread Christian Corti

On Tue, 5 Jan 2016, Fred Cisin wrote:
1) if the alignment of the head of the original recording and of the 
overwrite head are not a perfect match, then there can be some residual data 
somewhat off axis.


At a first thought I don't see how there can be residual data because 
there is the tunnel erase head after the R/W head. The drives must be very 
misaligned (i.e. more than the width of one erase half) to still have 
residual data.


2) if the data was overwritten once, with a known pattern, then somebody with 
sufficient resources and motivation can attempt to analyze the noise, and 
determine "what, overwritten by a 0 could produce the noise that we have 
here."  Accordingly, there are guvmint standards of MULTIPLE patterns to


That is why you don't take /dev/zero but /dev/[u]random for overwriting 
data.


Christian


Front panel update

2016-01-07 Thread Rod Smallwood

Hi Guys
   Just got back from the silk screeners. Panels everywhere!!
Final layers (Amber and white ) going on. Customising insets for type A 
and B  ready


Front is now matt black as per requests.

They are sourcing some ready made packaging and plastic cloth.
Its that soft stuff you get round hifi's and TV's etc.

I have some pictures I took on the wifes iPad. If I can get them off on 
to my PC I can send then out.

I'm working on a Web server as focal point for everything panel.

 In addition to DEC Straight 8,  8/e (A or B), 8/f and 8/m,
I also have artwork for  IBM 360 and Burroughs 3500

PDP 11/40 (PDP10) thru 11/70 are under way.

Regards

Rod



PDP-8 core memory for sale (_not_ from me)

2016-01-07 Thread Noel Chiappa
So there's this item:

  http://www.ebay.com/itm/262217954449

I'm not an -8 person, so maybe there's some reason nobody's biting,
but if not, I thought I'd point it out.

Noel


Re: PDP-8 core memory for sale (_not_ from me)

2016-01-07 Thread Rod Smallwood


On 07/01/2016 14:03, Noel Chiappa wrote:

So there's this item:

   http://www.ebay.com/itm/262217954449

I'm not an -8 person, so maybe there's some reason nobody's biting,
but if not, I thought I'd point it out.

Noel

Core is quite delicate stuff.
I'd want to see a good long printout of a repeated core test.
Rod


Re: PDP-8 core memory for sale (_not_ from me)

2016-01-07 Thread Zane Healy

> On Jan 7, 2016, at 6:03 AM, Noel Chiappa  wrote:
> 
> So there's this item:
> 
>  http://www.ebay.com/itm/262217954449
> 
> I'm not an -8 person, so maybe there's some reason nobody's biting,
> but if not, I thought I'd point it out.
> 
>   Noel

It could be because there is no core plane shown in any of the photo’s. :-)  

The H219A control board needs an H220 core stack.  This is only of use if you 
have a bad control board.

Zane




Re: Conservation issue - shrink-wrapped manual

2016-01-07 Thread Al Kossow



On 1/6/16 9:42 AM, Noel Chiappa wrote:


I have a DEC manual (actually a Products Guide) still in its original
shrink-wrap, and I'm interested in hearing opinions/rationales on whether or
not I should keep it like that


The CHM archivists tell me shrink wrap will continue to shrink, and it 
should be removed. We also don't keep vinyl binders, because they outgas

and get sticky over time.





Re: Floppy recovery

2016-01-07 Thread Fred Cisin
1) if the alignment of the head of the original recording and of the 
overwrite head are not a perfect match, then there can be some residual 
data somewhat off axis.


On Thu, 7 Jan 2016, Christian Corti wrote:
At a first thought I don't see how there can be residual data because there 
is the tunnel erase head after the R/W head. The drives must be very 
misaligned (i.e. more than the width of one erase half) to still have 
residual data.


Yes, that makes sense.  But, the erase head probably doesn't scramble the 
weak residual flux transitions as much as overwriting does.


2) if the data was overwritten once, with a known pattern, then somebody 
with sufficient resources and motivation can attempt to analyze the noise, 
and determine "what, overwritten by a 0 could produce the noise that we 
have here."  Accordingly, there are guvmint standards of MULTIPLE patterns 
to

That is why you don't take /dev/zero but /dev/[u]random for overwriting data.


Even then, since the s'posedly random data that was used for overwrite is 
still readable, leading to, "OK, here's what's currently on it, what prior 
recording would generate THIS background noise?", thus, a scond overwrite 
of a different pattern would render it past any "reasonable" efforts.
I've heard that there are "standards" for a number of overwrites, and what 
patterns to use, . . .


But, as I mentioned before, the most thorough protection of all, is to be 
too boring for it to be worth any effort at all.
'Course extremely violent total destruction of the drive has its own 
emotional benefit!



I suspect that most of the stuff that impresses the hell out of outsiders 
to the field is really nothing more than patching DIRectories to "UNERASE" 
files that haven't even been overwritten.




Re: Floppy recovery

2016-01-07 Thread Chuck Guzis

On 01/07/2016 09:36 AM, Fred Cisin wrote:


I've heard that there are "standards" for a number of overwrites, and
 what patterns to use, . . .


The paper that got the most notice was from Peter Gutmann from the early 
90s.


https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

--Chuck



Re: Floppy recovery

2016-01-07 Thread Fred Cisin

I've heard that there are "standards" for a number of overwrites, and
 what patterns to use, . . .


On Thu, 7 Jan 2016, Chuck Guzis wrote:

The paper that got the most notice was from Peter Gutmann from the early 90s.
https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html


Thank you!

That answers most of our ignorant questions.


I wonder what the cost is to do those techniques.





RE: Free HP 3000 Equipment for removal (Denver Craigslist)

2016-01-07 Thread Rich Alderson
From: ben
Sent: Wednesday, January 06, 2016 10:30 PM

> On 1/6/2016 8:27 PM, Ethan Dicks wrote:

>> On Wed, Jan 6, 2016 at 9:14 PM, ben  wrote:

>>> But where do you get the 2016 Line Printer Calender?

>> jp2a --width=76 snoopy.jpg | lpr
>> cal 2016 | lpr

> As the printer chugs away, on second thought I want the NUDE.

You'll have to be more specific.  Which one?

Rich


Re: Floppy recovery

2016-01-07 Thread Mike Stein
- Original Message - 
From: "Fred Cisin" 
To: "General Discussion: On-Topic and Off-Topic Posts" 
Sent: Thursday, January 07, 2016 1:58 PM
Subject: Re: Floppy recovery


>>> I've heard that there are "standards" for a number of overwrites, and
>>>  what patterns to use, . . .
> 
> On Thu, 7 Jan 2016, Chuck Guzis wrote:
>> The paper that got the most notice was from Peter Gutmann from the early 90s.
>> https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
> 
> Thank you!
> 
> That answers most of our ignorant questions.
> 
> 
> I wonder what the cost is to do those techniques.
> 

Well, if you don't have access to thermite or even a large sledgehammer then 
this recommendation of his might be a cost-effective solution:

http://www.diskstroyer.com/Home.html

Even if you do have that sledgehammer this might be useful as a preprocessing 
step before final treatment with the aforementioned hammer.

I'm fortunate in already having some of the tools in this kit and some 
experience in their use and I can highly recommend this technique, not only for 
data destruction but also for relaxation and a source of various unique parts.

I wonder how many of those clocks made from HD platters contain sensitive 
information; definitely something else to worry about...

;-)


s100

2016-01-07 Thread nierveze

hello everyone ,
first am 1 on the correct channel??
I have several S100 boards , found 25 years ago,
kept in my cellar and forgottenfortunately they are still in good 
conditions , all circuits are standard ttl (only a few proms) ,and all 
circuits are on sockets so all is easy to repair.
I cleaned and repaired the power supply (only one capacitor exploded ) , 
I have the correct voltages +-
19v ,+9V on the backplane , now the power supply works . I have very few 
documentations
only a few booklets with configuration data on some of the boards , no 
schematic.
The maker was a french company named ADD-X ,located near Toulouse south 
west of France . Machines ran cpm/mpm .

I have boards of several configurations :
*cpu boards with Z80,64k of dynamic rams and 2708 . There are 
configuration switches
around the eprom socket to use 2708 or 2716 . I wonder how it is 
possible to address more than 64K (rams+eprom)with a Z80 . I need 
documentation about it . On Ebay I found a Z64 board that is identical , 
I cannot contact the seller , I tried to get informations ... he does 
not accept emails. Does anyone know that Z64 ?

*boards with 4 rs232+1 ppi
*boards with 2 rs232+1ppi+1 fdc configurable for 8 inches or 5 inches 
floppys.

*hdc controllers with one hard disk
I also have disquettes,and backplanes .
I need informations on the S100/cpm systems , how are boards addressed , 
it is something like qbus/unibus : fixed address for each category of 
board,is the console at a fixed address???etc . Since that epoch I have 
all the classic books from R.Zaks
about microprocessors and cpm , there are very few informations on the 
S100 bus.
I built a system with a cpu and a board with RS232 and fdc,I connected 
the terminal to the port labeled 'con0'(console 0??) ,nothing happened 
on the terminal.
It may be lots of thing from a dead cpu or eprom to rs232 driver . I did 
not test more for today.
I want to build a small system with a monitor in rom to examine/modify 
ram , registers just to learn Z80 . What monitor can be used ? I have  
what is necessary to compile and burn eproms .

Thanks for your help  . I have lots of questions.I can send photos
to identify boards .
Best regards Alain Nierveze


Re: Floppy recovery

2016-01-07 Thread Paul Koning

> On Jan 7, 2016, at 1:13 PM, Chuck Guzis  wrote:
> 
> On 01/07/2016 09:36 AM, Fred Cisin wrote:
> 
>> I've heard that there are "standards" for a number of overwrites, and
>> what patterns to use, . . .
> 
> The paper that got the most notice was from Peter Gutmann from the early 90s.
> 
> https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

Oh yes, one of my favorite topics.  I get a lot of questions where people refer 
to "the DoD wiping standard".  Unfortunately, there isn't one.  There are some 
very old documents that give suggestions, but those seem to have expired long 
ago.  Gutmann's document is similarly old.  Any decade-old rule suffers from 
the fact that drive technology has changed drastically, and considerations that 
were valid then are no longer valid.  Gutmann did great work at the time, and 
his contribution deserves to be honored, but it has very much been superseded 
by technology change.  Tracks are so much smaller and margins so tiny that 
multiple erasures don't add much if anything.

On the other hand, block replacement, and especially the write remapping done 
by SSDs, can leave stuff in places you can't even see until you take the device 
apart.  In fact, hard drives are not much of an issue, but SSDs should make you 
worry.

Incineration should work, but use enough heat.  Shredding is questionable, 
unless the particles are very small.  I think high end shredders are required 
to produce particles less than 1/32 inch in size.

Much more recent work on erase was done by Gordon Hughes at UCSD.  See 
http://cmrr.ucsd.edu/people/Hughes/secure-erase.html for more.

If you want data security and don't like destroying your hardware, SED 
("self-encrypting drives") are a solution. Those encrypt all data, and "erase" 
by discarding and replacing the data encryption key.  So all your sectors 
instantly turn to random noise.  SSD versions of those are starting to appear, 
which addresses the invisible old copies problem that regular SSDs have.  The 
great thing of an SED is not just the security of its erase function, but in 
particular the speed: it takes only seconds to destroy all the data on the 
drive.

paul




Re: I COULD JUST KICK MYSELF IN THE BUTT!!! commodore pet . . .

2016-01-07 Thread William Donzelli
> I don't know if
> any of you remember when they switched over to the unlimited monthly
> plan but as for in Oregon AOL Servers crashed for about 3 months from
> such a heavy load of members dialing up and connecting quick question
> here _*<--- Did this happen in your area if so where were you?*_

Yes, I remember those times. I was everywhere.

--
Will, ex will...@ans.net


Re: Floppy recovery

2016-01-07 Thread Eric Smith
On Thu, Jan 7, 2016 at 1:17 PM, Paul Koning  wrote:
> If you want data security and don't like destroying your hardware, SED 
> ("self-encrypting drives") are a solution. Those encrypt all data, and 
> "erase" by discarding and replacing the data encryption key.  So all your 
> sectors instantly turn to random noise.  SSD versions of those are starting 
> to appear, which addresses the invisible old copies problem that regular SSDs 
> have.  The great thing of an SED is not just the security of its erase 
> function, but in particular the speed: it takes only seconds to destroy all 
> the data on the drive.

You're assuming that the SED doesn't store an extra copy of the
decryption key in NVM or on the medium. IMO, that's a very naive
assumption. Also, reverse-engineering has shown that at least some
SEDs have very bad crypto implementations.

Even if your SED doesn't have a back door or badly implemented crypto,
you also have to worry about whether someone has managed to install
compromised firmware on it. People once thought that hacked drive
firmware was too difficult or expensive to develop for anyone other
than three-letter agencies, but that's been proven false.

I'm OK with an SED being a component of the data security solution,
but I'm not willing to count on it exclusively. I'll still run
software disk encryption. Preferably open-source software disk
encryption, so that the source code can be audited, though that's not
a guarantee either.

One might expect that simple security measures would be enough as long
as the threat model you're concerned with isn't three-letter agencies.
Unfortunately any back doors or badly implemented crypto, whether
installed by TLAs or just through incompetence, are likely to be
exploited by many miscreants, not just TLAs.

If your threat model IS three-letter agencies, you're basically doomed
from the outset.


Re: Floppy recovery

2016-01-07 Thread Paul Koning

> On Jan 7, 2016, at 3:33 PM, Eric Smith  wrote:
> 
> On Thu, Jan 7, 2016 at 1:17 PM, Paul Koning  wrote:
>> If you want data security and don't like destroying your hardware, SED 
>> ("self-encrypting drives") are a solution. Those encrypt all data, and 
>> "erase" by discarding and replacing the data encryption key.  So all your 
>> sectors instantly turn to random noise.  SSD versions of those are starting 
>> to appear, which addresses the invisible old copies problem that regular 
>> SSDs have.  The great thing of an SED is not just the security of its erase 
>> function, but in particular the speed: it takes only seconds to destroy all 
>> the data on the drive.
> 
> You're assuming that the SED doesn't store an extra copy of the
> decryption key in NVM or on the medium. IMO, that's a very naive
> assumption. Also, reverse-engineering has shown that at least some
> SEDs have very bad crypto implementations.

True.  I know of at least one first generation SED that uses ECB mode.  Anyone 
who has looked at IEEE 802.11 knows that cryptographic competence is not 
common, and that some of the people designing cryptosystems are not only 
unqualified to do so, but sufficiently ignorant that the aren't even aware that 
they aren't qualified.

With SEDs as with any other security tool, one has to be sceptical and ask very 
pointed questions.  For example, with the SSD kind, I probed deeply into how 
the key is replaced in a "crypto erase" operation, down to the level of the 
flash memory primitives involved.  The particular implementation I looked at 
had the correct answers.

> Even if your SED doesn't have a back door or badly implemented crypto,
> you also have to worry about whether someone has managed to install
> compromised firmware on it. People once thought that hacked drive
> firmware was too difficult or expensive to develop for anyone other
> than three-letter agencies, but that's been proven false.

The key here is the use of signed firmware, which I believe is the normal 
practice.  With that, it's not just a matter of reverse engineering, the 
attacker would also have to steal the firmware signing key.

> I'm OK with an SED being a component of the data security solution,
> but I'm not willing to count on it exclusively. I'll still run
> software disk encryption. Preferably open-source software disk
> encryption, so that the source code can be audited, though that's not
> a guarantee either.

Agreed.  I've been a TrueCrypt user ever since DriveCrypt went off track.

> One might expect that simple security measures would be enough as long
> as the threat model you're concerned with isn't three-letter agencies.
> Unfortunately any back doors or badly implemented crypto, whether
> installed by TLAs or just through incompetence, are likely to be
> exploited by many miscreants, not just TLAs.
> 
> If your threat model IS three-letter agencies, you're basically doomed
> from the outset.

Maybe so.  But you can definitely make things much harder, which is worth doing.

paul



Cloning a PCB

2016-01-07 Thread Mike Stein
Any suggestions/hints/experience/links regarding the best/easiest way to clone 
a (two-sided) PCB, i.e. create a Gerber or equivalent file from a PCB layout 
instead of a schematic?

TIA,

m


Re: s100

2016-01-07 Thread Brent Hilpert
On 2016-Jan-07, at 11:13 AM, nierveze wrote:
> first am 1 on the correct channel??
> I have several S100 boards , found 25 years ago,
> ...

> I wonder how it is possible to address more than 64K (rams+eprom)with a Z80 .

S100 memory boards often incorporated a bank-switching scheme to allow for 
multiple 64K banks in the system.
The convention was a dedicated I/O port number (0x40?) to which one writes a 
bit pattern to select the desired bank.
Such memory boards have configuration switches to set their bank ID/number.
For a system to use this scheme, all the memory boards in the system are to be 
listening on that same port, waiting to recognise their ID.

There's also the PHANTOM line on the bus, used to allow a bootstrap ROM to take 
precedence over some address space at reset/power-on, thus overlaying some RAM 
during boot. The ROM is switched out at some point to allow access to full RAM.


> I need documentation about it .

Best sourcess for S100 board docs are:
http://www.s100computers.com/Hardware%20Index%20Page.htm
and
http://maben.homeip.net/static/S100/

Seems to be a lot of duplication between the two, I'm not sure which site the 
(duplicate) material originated on (who's copying whom).

There's also this site, although I'm not as familiar with it:
http://www.hartetechnologies.com/manuals/



Re: Cloning a PCB

2016-01-07 Thread Glen Slick
On Thu, Jan 7, 2016 at 1:33 PM, Mike Stein  wrote:
> Any suggestions/hints/experience/links regarding the best/easiest way to 
> clone a (two-sided) PCB, i.e. create a Gerber or equivalent file from a PCB 
> layout instead of a schematic?
>

Easiest? Throw some money at having someone do the work for you.

Grant at http://altairkit.com says that he used these people to scan
and replicate some vintage PCBs: http://www.mhtest.com/scanning.shtml

No idea how much that costs. Probably in the if you have to ask you
can't afford it range.


Re: Cloning a PCB

2016-01-07 Thread wulfman
I reverse engineer boards as a hobby i produce full schematics and can
also replicate PC boards
I have the boards produced in china. should be cheaper now that china is
crashing and burning

just takes time and money


On 1/7/2016 3:11 PM, Glen Slick wrote:
> On Thu, Jan 7, 2016 at 1:33 PM, Mike Stein  wrote:
>> Any suggestions/hints/experience/links regarding the best/easiest way to 
>> clone a (two-sided) PCB, i.e. create a Gerber or equivalent file from a PCB 
>> layout instead of a schematic?
>>
> Easiest? Throw some money at having someone do the work for you.
>
> Grant at http://altairkit.com says that he used these people to scan
> and replicate some vintage PCBs: http://www.mhtest.com/scanning.shtml
>
> No idea how much that costs. Probably in the if you have to ask you
> can't afford it range.
>


-- 
The contents of this e-mail and any attachments are intended solely for the use 
of the named
addressee(s) and may contain confidential and/or privileged information. Any 
unauthorized use,
copying, disclosure, or distribution of the contents of this e-mail is strictly 
prohibited by
the sender and may be unlawful. If you are not the intended recipient, please 
notify the sender
immediately and delete this e-mail.



Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Stefan Skoglund (lokal
tor 2016-01-07 klockan 15:08 -0500 skrev Mouse: 
> > Well, if you don't have access to thermite [...]
> 
> Actually, red heat is well above the Curie temperature for most media,
> isn't it?  You could chuck the platters into the coals of a bonfire,
> let them get up to a nice cherry red.  Depending on what the platters
> are made of, this might even melt them, which should effectively
> destroy any organization in the material that once formed a thin film
> on them.  If not, it should demagnetize the coating

Unhealthy.

I would expect that to generate a fair amount of sulphuric and
hydrochloric acid.
A fair bit of the shit inside the HD also would end up in the nearby
soil.



Re: Floppy recovery

2016-01-07 Thread Mouse
>>> If you want data security and don't like destroying your hardware,
>>> SED ("sel$
>> You're assuming that the SED doesn't store an extra copy of the
>> decryption key in NVM or on the medium.

That was my initial reaction too!

>> Also, reverse-engineering has shown that at least some SEDs have
>> very bad crypto implementations.

I was not aware of that, but (and this is a depressing commentary on
_something_) it does not surprise me in the least.

>> Even if your SED doesn't have a back door or badly implemented
>> crypto, you also have to worry about whether someone has managed to
>> install compromised firmware on it.
> The key here is the use of signed firmware, which I believe is the normal pr$

That's hardly a fix; all it does is somewhat reduce the pool of people
who can create the compromised firmware.  I don't trust the vendor's
internal security to keep the key from leaking and I don't trust the
vendor's HR security to prevent malware authors from making it to the
inside, and I *sure* don't trust the vendor to resist a request from
law enforcement for an easy-to-access backdoor (which will, of course,
promptly get abused, either by others or for other purposes).

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Re: Floppy recovery

2016-01-07 Thread Guy Sotomayor

> On Jan 7, 2016, at 3:52 PM, Mouse  wrote:
> 
> 
>>> Even if your SED doesn't have a back door or badly implemented
>>> crypto, you also have to worry about whether someone has managed to
>>> install compromised firmware on it.
>> The key here is the use of signed firmware, which I believe is the normal pr$
> 
> That's hardly a fix; all it does is somewhat reduce the pool of people
> who can create the compromised firmware.  I don't trust the vendor's
> internal security to keep the key from leaking and I don't trust the
> vendor's HR security to prevent malware authors from making it to the
> inside, and I *sure* don't trust the vendor to resist a request from
> law enforcement for an easy-to-access backdoor (which will, of course,
> promptly get abused, either by others or for other purposes).
> 

I don’t know if it’s typical or not, but every company that I’ve worked for that
has managed crypto-keys has taken key security *very* seriously.  For example,
the key generating system (usually something custom) is kept in an “air gapped”
vault (and I *do* mean vault).  The vault can only be opened when two authorized
individuals are present (ie neither one can get into the vault without the 
other).
Everything is tracked and audited on a regular basis.

One big semi-conductor company does it this way (I have personal knowledge).
I also helped set up this type of crypo-key management for one of the startups 
I 
worked for once upon a time (even to the point where they crypto-key hardware
would “self destruct” if tampered with…sorry no sparks, smoke or other visual
aids…it just erased itself).

TTFN - Guy



Re: Floppy recovery

2016-01-07 Thread Mouse
>> I don't trust the vendor's internal security to keep the key from
>> leaking and I don't trust the vendor's HR security to prevent
>> malware authors from making it to the inside, and I *sure* don't
>> trust the vendor to resist a request from law enforcement [...]
> I donâ¿¿t know if itâ¿¿s typical or not, but every company that
> Iâ¿¿ve worked for that has managed crypto-keys has taken key security
> *very* seriously.

I find that easy to believe.  However:

(1) "[E]very company [you]'ve worked for" is almost certainly a heavily
biased sample; if you have a tenth the clue you appear to, you
would stay away from the dodgier ones.

(2) Taking key security seriously is a very different thing from being
good at key security.  (They probably correlate positively, but not
nearly as strongly as one might wish.)

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Re: Floppy recovery

2016-01-07 Thread Guy Sotomayor

> On Jan 7, 2016, at 4:13 PM, Mouse  wrote:
> 
>>> I don't trust the vendor's internal security to keep the key from
>>> leaking and I don't trust the vendor's HR security to prevent
>>> malware authors from making it to the inside, and I *sure* don't
>>> trust the vendor to resist a request from law enforcement [...]
>> I donâ¿¿t know if itâ¿¿s typical or not, but every company that
>> Iâ¿¿ve worked for that has managed crypto-keys has taken key security
>> *very* seriously.
> 
> I find that easy to believe.  However:
> 
> (1) "[E]very company [you]'ve worked for" is almost certainly a heavily
>biased sample; if you have a tenth the clue you appear to, you
>would stay away from the dodgier ones.

Probably.  ;-)

> 
> (2) Taking key security seriously is a very different thing from being
>good at key security.  (They probably correlate positively, but not
>nearly as strongly as one might wish.)
> 

Agree.  In the cases I’m aware of they do both.  ;-)

TTFN - Guy




Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread drlegendre .
What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?

On Thu, Jan 7, 2016 at 5:09 PM, Stefan Skoglund (lokal <
stefan.skogl...@agj.net> wrote:

> tor 2016-01-07 klockan 15:08 -0500 skrev Mouse:
> > > Well, if you don't have access to thermite [...]
> >
> > Actually, red heat is well above the Curie temperature for most media,
> > isn't it?  You could chuck the platters into the coals of a bonfire,
> > let them get up to a nice cherry red.  Depending on what the platters
> > are made of, this might even melt them, which should effectively
> > destroy any organization in the material that once formed a thin film
> > on them.  If not, it should demagnetize the coating
>
> Unhealthy.
>
> I would expect that to generate a fair amount of sulphuric and
> hydrochloric acid.
> A fair bit of the shit inside the HD also would end up in the nearby
> soil.
>
>


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Paul Berger

On 2016-01-07 9:06 PM, drlegendre . wrote:

What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?


Or spin the disk and scrape off the oxide,  I have seen disk drive do 
that all by themselves, but as I said earlier modern disks mostly use 
glass platters so you do not even have to disassemble them to smash the 
platters.


Paul.


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Fred Cisin

On Thu, 7 Jan 2016, drlegendre . wrote:

What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?


Bending the platters will keep them from turning and being usable in the 
drive, but does NOT prevent various other imaging methods.


Breaking a platter in half doesn't prevent those techniques.

Shattering a glass platter into dozens of pieces doesn't prevent those 
techniques.


breaking it into tiny bits may or may not depending on how much effort 
somebody is willing to put into identifying where each piece came from in 
the platter.


High heat should work.

Sanding all of the rust off of the platter should work.

Mailing the drive to a government office, with a note saying, "please 
help me recover the pictures of my grandmother's birthday party", and 
having it lost in their mailroom might work.






Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Charles Anthony
On Thu, Jan 7, 2016 at 6:20 PM, Fred Cisin  wrote:

> On Thu, 7 Jan 2016, drlegendre . wrote:
>
>> What's wrong with the "disassemble and rend with heavy hammer" approach?
>> Doesn't that render the platters un-readable, if done with sufficient
>> ardor?
>>
>
> Bending the platters will keep them from turning and being usable in the
> drive, but does NOT prevent various other imaging methods.
>
> Breaking a platter in half doesn't prevent those techniques.
>
> Shattering a glass platter into dozens of pieces doesn't prevent those
> techniques.
>
> breaking it into tiny bits may or may not depending on how much effort
> somebody is willing to put into identifying where each piece came from in
> the platter.
>
> High heat should work.
>
> Sanding all of the rust off of the platter should work.
>
> Mailing the drive to a government office, with a note saying, "please help
> me recover the pictures of my grandmother's birthday party", and having it
> lost in their mailroom might work.
>
>
>
Putting it a crate with a few hundred other drives...

-- Charles


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread jwsmobile



On 1/7/2016 6:20 PM, Fred Cisin wrote:

On Thu, 7 Jan 2016, drlegendre . wrote:

What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?


Bending the platters will keep them from turning and being usable in 
the drive, but does NOT prevent various other imaging methods.


Breaking a platter in half doesn't prevent those techniques.
There are machines sold to machine document destruction folks that will 
shred the entire drive into pieces the size of large grains of sand.  
They are deployable on trucks with on site document destruction 
services, and I know of two friends here in Orange Country who have 
bought them.


They are also useful if you are also doing your own high-grade gold 
refining pass, for preparation of material.  The two recycling operators 
I know are probably doing this process as well.  Most gold recover folks 
are not trusted.


thanks
jim


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Chuck Guzis

On 01/07/2016 08:17 PM, jwsmobile wrote:


They are also useful if you are also doing your own high-grade gold
refining pass, for preparation of material.  The two recycling
operators I know are probably doing this process as well.  Most gold
recover folks are not trusted.


There are several Youtube clips of these things in operation, including 
one that's being fed vintage Macs.


--Chuck


Re: Open VMS System Mgt Guide Scripts Avail.

2016-01-07 Thread Jason T
On Sun, Jan 3, 2016 at 2:31 PM, william degnan  wrote:
> I've uploaded the contents of the disk that accompanis the book "OpenVMS
> System Management Guide" by Lawrence Baldwin here:
>
> http://www.vintagecomputer.net/digital/OpenVMS/

There are a lot of files there.  Can you post them zipped up as well?

j