On Wed, 20 Aug 2008, Robert J. Hansen wrote:
Faramir wrote:
lets say I just want to avoid recovery software like "get data back"
being able to recover a file. Is there a reliable way to do it without
going to "extreme" solutions?
No.
==
i'll play the other side...
depending on
Chris Walters wrote:
> Ah, yes. The obligatory warning. One method that I suggested would get the
> gold star for dangerous, foolhardy, do not do: Placing your hard drive in the
> core of an active nuclear reactor.
Better than some ideas I've heard. (E.g., use ClF3 to scour the
platters. Only
On Wed, 20 Aug 2008, Robert J. Hansen wrote:
ObWarning: many of the techniques we've discussed for destroying hard
drives are really quite dangerous. Thermite is _not_ a friendly
chemical. Neither is sulfuric acid. Even an approach as low-tech as
hammering the platters into oblivion can be
Robert J. Hansen wrote:
> I can only speak for myself here, but I strongly suspect Werner, David,
> Mark and everyone else who's been chiming in will agree -- we are not
> talking about total destruction of hard drives as something you should
> want to do.
>
> We're talking about total destruction
Hi!
Am Mittwoch, den 20.08.2008, 21:09 -0400 schrieb Faramir:
> The idea is
> to make deleted files (not whole drives) unrecoverable to commercial
> recovery software.
The german IT-magazine c't did such a test quite some time ago (in 2003,
IIRC) and found that a data recovery firm was unable to
Kunal Shah wrote:
> I wouldn't argue about methods discussed here to destroy the disk.
> However one consideration is, what data we are talking about. In my
> CISSP course, I was not taught to *destroy* data or protect it. I was
> just taught to make it so difficult for hacker to access it so that
Robert J. Hansen wrote:
> Faramir wrote:
>> lets say I just want to avoid recovery software like "get data back"
>> being able to recover a file. Is there a reliable way to do it
>> without going to "extreme" solutions?
>
> No.
>
>> I have seen advices about using ccleaner, fileshredder, erase57,
Michel Messerschmidt wrote:
> There is also the possibility to use encryption for *all* data on a
> harddisk. If the key is stored somewhere else (e.g. in your mind or on
> another disk), this may prevent data recovery on a similar level.
Let's not confuse a *key* and a *passphrase*. This discus
Faramir wrote:
> lets say I just want to avoid recovery software like "get data back"
> being able to recover a file. Is there a reliable way to do it
> without going to "extreme" solutions?
No.
> I have seen advices about using ccleaner, fileshredder, erase57, and
> other tools like those
For t
Chris Walters wrote:
> I hate to tell you this, but the F.B.I. Computer Forensics Laboratory has
> successfully recovered data from a drive, where the platters were shot
> multiple
> times with a shotgun.
I have a friend who works in Interesting Places who tells me they once
successfully put toge
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Werner Koch escribió:
> On Wed, 20 Aug 2008 16:45, [EMAIL PROTECTED] said:
>
>> If you are looking to wipe a disk,you can use DiskNuke. Both are
>> sourceforge.net projects.
>
> You cannot clear a modern drive using external software! It doesn't
Mark H. Wood wrote:
> Hmmm. You'd have to ensure that every point within the coating on
> every platter reaches the critical temperature (perhaps for a minimum
> amount of time?). That sounds too uncertain when certain destruction
> is required.
The idea is that if, say, the CP of the ferromagne
On Wed, 20 Aug 2008, Michel Messerschmidt wrote:
There is also the possibility to use encryption for *all* data on a
harddisk. If the key is stored somewhere else (e.g. in your mind or on
another disk), this may prevent data recovery on a similar level.
===
encrypted disks, and so
On Wed, 20 Aug 2008, Chris Walters wrote:
I hate to tell you this, but the F.B.I. Computer Forensics Laboratory
has successfully recovered data from a drive, where the platters were
shot multiple times with a shotgun.
==
that wouldn't surprise me, but is there a reference for it?
On Wed, Aug 20, 2008 at 04:00:19PM -0400, Chris Walters wrote:
> I hate to tell you this, but the F.B.I. Computer Forensics Laboratory has
> successfully recovered data from a drive, where the platters were shot
> multiple
> times with a shotgun.
>
> The only sure way to make sure no one can reco
Mark H. Wood wrote:
> On Wed, Aug 20, 2008 at 04:00:19PM -0400, Chris Walters wrote:
>> I hate to tell you this, but the F.B.I. Computer Forensics Laboratory has
>> successfully recovered data from a drive, where the platters were shot
>> multiple
>> times with a shotgun.
>>
>> The only sure way t
On Wed, Aug 20, 2008 at 04:21:04PM -0400, John W. Moore III wrote:
> I believe that We are all agreed that physical destruction of the HD is
> the only truly effective means of ensuring Data cannot be recovered.
There is also the possibility to use encryption for *all* data on a
harddisk. If the k
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
John W. Moore III wrote:
> Chris Walters wrote:
>> Werner Koch wrote:
>
>>> That won't be an easy puzzle to solve.
>
>> I hate to tell you this, but the F.B.I. Computer Forensics Laboratory has
>> successfully recovered data from a drive, where the
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA512
Chris Walters wrote:
> Werner Koch wrote:
>> That won't be an easy puzzle to solve.
> I hate to tell you this, but the F.B.I. Computer Forensics Laboratory has
> successfully recovered data from a drive, where the platters were shot
> multiple
> t
Werner Koch wrote:
> You cannot clear a modern drive using external software! It doesn't
> matter what validated software algorithm you use. Drives may reorder
> sectors on the fly, they use read and write caches and do all kind of
> tricks to squeeze out more performance. There are even solid s
On Wed, 20 Aug 2008 16:45, [EMAIL PROTECTED] said:
> If you are looking to wipe a disk,you can use DiskNuke. Both are
> sourceforge.net projects.
You cannot clear a modern drive using external software! It doesn't
matter what validated software algorithm you use. Drives may reorder
sectors on
On Wed, Aug 20, 2008 at 09:11:16AM -0500, Robert J. Hansen wrote:
> If anyone on the list is an EE or a physics geek looking for a good
> paper, it might be interesting to explore using the Curie Point as a
> data erasure technique. For a lot of the exotic magnetic materials used
> in modern hard
To check the effectiveness, according to DoD anything that is not wiped with
algorithm DoD 5220.22M has potential to be recovered.
File shredder works well with DoD algorithm and higher. Also it is free.
If you are looking to wipe a disk,you can use DiskNuke. Both are
sourceforge.net projects.
http://www.fileshredder.org/
File Shredder works perfectly great for this purpose.
-- Original message --
From: Atom Smasher <[EMAIL PROTECTED]>
> On Wed, 20 Aug 2008, Bhushan Jain wrote:
>
> > I wanted to know how could the file be deleted securely using PGP?
> =
David Shaw wrote:
> The notable difference is that in the new regulations, you cannot use
> any overwrite method to sanitize a disk. The only way to sanitize is
> to degauss the drive or physically destroy the thing.
If anyone on the list is an EE or a physics geek looking for a good
paper, it mi
On Aug 20, 2008, at 4:08 AM, Werner Koch wrote:
On Wed, 20 Aug 2008 02:32, [EMAIL PROTECTED] said:
However, as you are asking this question of the GnuPG list, I suspect
you mean to ask about GnuPG. GnuPG does not have a secure delete
feature.
Let me add that one reason for not providing a s
On Aug 20, 2008, at 3:04 AM, Vlad SATtva Miller wrote:
Robert J. Hansen (20.08.2008 09:12):
Bhushan Jain wrote:
I wanted to know how could the file be deleted securely using PGP?
Assuming you meant GnuPG, the answer is 'no'.
Assuming you meant PGP, the answer is 'maybe'. PGP provides a sec
> 1. You are not root enough (no problem is /usr/local/bin writable by you)
Ooops!
I mean "no problem if /usr/local/bin is writable by you"
Gabor
___
Gnupg-users mailing list
Gnupg-users@gnupg.org
http://lists.gnupg.org/mailman/listinfo/gnupg-users
> /usr/company/bin/ginstall: cannot remove `/usr/local/bin/gpgsplit':
> Read-only file
> system
> bash-2.05b$
1. You are not root enough (no problem is /usr/local/bin writable by you)
and
2. You forgot to remount /usr/local to r/w
Gabor
___
Gnupg-us
Hi,
Unable to install gnupg-1.4.9 ..
Making install in zlib
make-3.79.1-p3a[1]: Entering directory `/users/ruday/gnupg-1.4.9/zlib'
make-3.79.1-p3a[2]: Entering directory `/users/ruday/gnupg-1.4.9/zlib'
make-3.79.1-p3a[2]: Nothing to be done for `install-exec-am'.
make-3.79.1-p3a[2]: Nothing to be
On Wed, 20 Aug 2008 02:32, [EMAIL PROTECTED] said:
> However, as you are asking this question of the GnuPG list, I suspect
> you mean to ask about GnuPG. GnuPG does not have a secure delete
> feature.
Let me add that one reason for not providing a secure deletetion feature
is that gpg is Unix to
On Tue, 19 Aug 2008 12:01, [EMAIL PROTECTED] said:
> Do anyone have any suggestions on how to proceed?
Check out whether scdaemon is working, example:
$ gpg-connect-agent
> scd serialno
S SERIALNO D27600012401010100010347 0
OK
>
Youy probably get an error here. To further i
Vlad "SATtva" Miller wrote:
> It employs Gutmann's methodology on secure file erasure, so there
> *is* a study of its effectiveness.
No one in the private sector has ever claimed to be able to recover data
overwritten even once.
Think about it this way. The next two people you see today, one of
Robert J. Hansen (20.08.2008 09:12):
> Bhushan Jain wrote:
>> I wanted to know how could the file be deleted securely using PGP?
>
> Assuming you meant GnuPG, the answer is 'no'.
>
> Assuming you meant PGP, the answer is 'maybe'. PGP provides a secure
> deletion tool, but as far as I know there
34 matches
Mail list logo