![]() Wipe is slower than shred, because it uses by default more overwriting passes and therefore it is more secure.įor example securely deleting the Windows 98 Swap File from a mounted (FAT) windows partition using 35 overwriting passes: wipe -D /mnt/windows/win386.swp Wipe uses by default 35 overwriting passes. ![]() WIPE from Sourceforge see Similar to shred you can use wipe to securely delete simple files but also entire partitions or harddisks.Therefore shred is faster than wipe (see below).įor example securely deleting all data on the first IDE harddrive: shred -v /dev/hda ![]() Shred uses by default 25 overwriting passes, you can increase and decrease the number of overwriting passes. SHRED from the GNU coreutils see can use shred to securely delete simple files but also entire partitions or harddisks.If you want to have ultimate security, use encryption for example LOOP-AES Įncrypt your home directory or create an encrypted partition or container to save your data there. We will not take responsibility for loss of data. but using those tools makes it harder.ĬAUTION: On the other hand you will not be able to recover any data, deleted by those tools. SystemRescue provides a few tools which are able to make recovering of data nearly impossible - I say nearly impossible, because no one can give you a guarantee that for example the NSA or the FBI could not recover at least a part of that data. In this case a solution could be to wipe/shred the entire device (partition) where the sensitive data was stored to ensure that the data is really overwritten. This is the traditional way to do things, but many modern filesystem designs do not satisfy this assumption for example Ext4, XFS, ReiserFS, etc. The only way to make recovering of your sensitive data nearly impossible is to overwrite (“wipe” or “shred”) the data with several defined patterns.ĬAUTION: The use of wiping or shredding tools relies on a very important assumption: that the filesystem overwrites the data in place. I have heard of cases where people sold their old computers or harddisks and the buyer recovered their financial business data. For example financial data, private emails, tracks of your internet surfing habits etc. And even after that some people (for example the three-letter-agencies) with special equipment are able to restore your data at least partially.Įverybody has sensitive data which they want to keep private. The file - you thought has gone forever - remains on the disk until another file is created over it (until another file overwrites the disk space where the “deleted” file is still stored), and even after that, it might be possible to recover the data by studying the magnetic fields on the disk platter surface using forensic equipment.īefore the file is overwritten by a new file, everyone can easily retrieve the data for example by using a disk undelete utility. Most operating systems only remove references to the file when they are asked to delete a file. When you delete a file using the default commands of the operating system (for example “rm” in UNIX or “del” in DOS or emptying the recycle bin in WINDOWS) the operating system does NOT delete the file, the contents of the file remains on your hard disk. The secure removal of data is not as easy as you may think.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |