Sie sind nicht angemeldet.
Lieber Besucher, herzlich willkommen bei: Aqua Computer Forum. Falls dies Ihr erster Besuch auf dieser Seite ist, lesen Sie sich bitte die Hilfe durch. Dort wird Ihnen die Bedienung dieser Seite näher erläutert. Darüber hinaus sollten Sie sich registrieren, um alle Funktionen dieser Seite nutzen zu können. Benutzen Sie das Registrierungsformular, um sich zu registrieren oder informieren Sie sich ausführlich über den Registrierungsvorgang. Falls Sie sich bereits zu einem früheren Zeitpunkt registriert haben, können Sie sich hier anmelden.
Zitat von »Karlsson«
Definitiv dban (Darik's Boot and Nuke)! Habe ich erst kürzlich wieder für ein gutes Dutzend Platten verwendet. Findet sich u.a. auch auf der "Ultimate Boot CD" und der "System Rescue CD" - nicht ohne Grund.
![]() |
Quellcode |
1 |
if=/dev/zero of=dev/hdX bs=65536 |
Zitat
1. INTRODUCTION
Years ago, people using the old msdos, simply deleted a file by doing "del filename" and thought the the erase was forever. Then Norton's undelete was released and everyone could get back the files most of the time. After that people who wanted to keep people of their deleted files erased them by overwriting the file with random or 0x00 bytes and felt secure.
In 1996 Peter Gutmann published a paper called "Secure Deletion of Data from Magnetic and Solid-State Memory" at the 6th Usenix Security Symposium, where he pointed out that the data could even be recovered if you overwrote them triple times and more - using cheap equipment for about 1000-2500$.
The three utilities presented here try to cover this new area of secure deletion and prevent file recovery.
This release includes the full paper of Peter Gutmann from the 6th Usenix Security Proceeding (usenix6-gutmann.doc).
[...]
2. HOW THESE PROGRAMS WORK
The deletion process is as follows:
1. The overwriting procedure (in the secure mode) does a 38 times overwriting. After each pass, the disk cache is flushed.
2. truncating the file, so that an attacker don't know which diskblocks belonged to the file.
3. renaming of the file, so that an attacker can't draw any conclusion from the filename on the contents of the deleted file.
4. finally deleting the file (unlink).
[...]
The secure overwrite mode works that way:
1x overwrite with 0xff
5x random passes
27x overwriting with special values to make the recovery from MFM and RLL encoded harddisks hard/impossible - see Gutmann's paper on that which is also included.
5x random passes
Zitat von »BloodHound«
US Department of Defense 5220.22-M Clearing and Sanitization Matrix
-