On 20/09/11 14:50, Lee Winter wrote:
On Mon, Sep 19, 2011 at 10:23 PM, Scott Ferguson
prettyfly.producti...@gmail.com wrote:
I use Dban and shred (stick them in an old machine and take as long as
it takes) - then disable the drive (pin in the breather hole), pliers on
the power connectors.
On Mon, Sep 19, 2011 at 11:07 PM, Scott Ferguson
prettyfly.producti...@gmail.com wrote:
On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:
It remains an urban legend as long as there is no proof offered otherwise.
No - *that's* piss poor logic - the sort epoused by TV
On Tue, Sep 20, 2011 at 12:21 PM, D G Teed donald.t...@gmail.com wrote:
On Mon, Sep 19, 2011 at 11:07 PM, Scott Ferguson
prettyfly.producti...@gmail.com wrote:
On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:
I think it is healthy to have a dose of skepticism with
On 21/09/11 02:21, D G Teed wrote:
On Mon, Sep 19, 2011 at 11:07 PM, Scott Ferguson
prettyfly.producti...@gmail.com wrote:
On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:
snipped
You like listening to yourself type.
Speaks volumes about you, says nothing of me.
On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponce aaron.topo...@gmail.com wrote:
On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
If you want to be safe, you need to overwrite the data several times,
Have anything to back that up? If you're using drives that used the old MFM
or RLL
On Mon, Sep 19, 2011 at 1:21 PM, Lee Winter lee.j.i.win...@gmail.comwrote:
On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponce aaron.topo...@gmail.com
wrote:
On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
If you want to be safe, you need to overwrite the data several times,
On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:
On Mon, Sep 19, 2011 at 1:21 PM, Lee Winter lee.j.i.win...@gmail.com
wrote:
On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponce aaron.topo...@gmail.com
wrote:
On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
On 19/09/11 17:57, D G Teed wrote:
On Mon, Sep 19, 2011 at 1:21 PM, Lee Winterlee.j.i.win...@gmail.comwrote:
On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponceaaron.topo...@gmail.com
wrote:
On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
If you want to be safe, you need to
On Mon, Sep 19, 2011 at 3:08 PM, Lee Winter lee.j.i.win...@gmail.comwrote:
You also failed to consider the asymmetry between the possible
outcomes once the truth becomes known. If one-pass overwrite is
sufficient, but one uses multiple passes, then one has lost a small
increment of time.
All the back and forth. I say, if you want to be truly safe and if you have
the means, give your old hard the same treatment as the Terminator in T2...
Other than that, let your security meaures match your threat environment. If
you have to worry about National Technical Means, then by all means,
On 20/09/11 00:27, Aaron Toponce wrote:
On Sat, Sep 17, 2011 at 08:59:14AM +0200, Ralf Mardorf wrote:
If you want to be safe, you need to overwrite the data several
times,
Have anything to back that up?
Try eating your own dog food - the citation in the wikipedia link (made
no more
On 20/09/11 04:08, Lee Winter wrote:
On Mon, Sep 19, 2011 at 12:57 PM, D G Teed donald.t...@gmail.com wrote:
On Mon, Sep 19, 2011 at 1:21 PM, Lee Winter lee.j.i.win...@gmail.com
wrote:
On Mon, Sep 19, 2011 at 10:27 AM, Aaron Toponce aaron.topo...@gmail.com
wrote:
On Sat, Sep 17, 2011 at
On 20/09/11 05:24, D G Teed wrote:
On Mon, Sep 19, 2011 at 3:08 PM, Lee Winter lee.j.i.win...@gmail.com
mailto:lee.j.i.win...@gmail.com wrote:
You also failed to consider the asymmetry between the possible
outcomes once the truth becomes known. �If one-pass overwrite is
On Mon, Sep 19, 2011 at 10:23 PM, Scott Ferguson
prettyfly.producti...@gmail.com wrote:
I use Dban and shred (stick them in an old machine and take as long as
it takes) - then disable the drive (pin in the breather hole), pliers on
the power connectors.
DBAN is definitely one of the better
Forwarded Message
From: Mark mamar...@gmail.com
To: Debian List debian-user@lists.debian.org
Subject: Re: Wiping hard drives
Date: Fri, 16 Sep 2011 22:15:38 -0700
On Tue, Sep 13, 2011 at 12:59 PM, Aaron Toponce
aaron.topo...@gmail.com wrote
On Sat, 2011-09-17 at 08:59 +0200, Ralf Mardorf wrote:
Forwarded Message
From: Mark mamar...@gmail.com
To: Debian List debian-user@lists.debian.org
Subject: Re: Wiping hard drives
Date: Fri, 16 Sep 2011 22:15:38 -0700
On Tue, Sep 13, 2011 at 12:59 PM, Aaron
I think it is the ATA Security Erase I wrote about. Tough it seems it may
refer to different ways of doing the erase.
Not sure how this works but I used Secure-erase-enhance option. It trashed
my HDD for 133min. So I am guessing this completely overwrote the drive.
This is the best option I
On Tue, Sep 13, 2011 at 12:59 PM, Aaron Toponce aaron.topo...@gmail.comwrote:
DBan is overkill, by leaps and bounds. Not only does it force the full
drive, but the minimum number of wipes is 3. When already booted into
your Debian system, pulling up a terminal, and running the dd(1) command
Am Mittwoch, 14. September 2011 schrieb yudi v:
I used an external USB/eSATA case hooked up via eSATA and then bootet
GRML. The BIOS did not protect the external drive and I was able to
transfer the ATA Secure Command via eSATA. I bet it might not work
via USB tough.
Booted from
--- On Tue, 9/13/11, yudi v yudi@gmail.com wrote:
I would do: dd if=/dev/urandom of=/dev/sdX (Note there is no partition
number.)
I only use sdX# for partitions that are unencrypted. It's redundant to
write over a LUKS container.
I prefer security over expediency: Just wipe the
With an SSD or modern HDD look for secure erase, e.g., with hdparm or gparted.
--
Best regards,
Jörg-Volker.
--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of unsubscribe. Trouble? Contact listmas...@lists.debian.org
Archive:
On 14/09/11 02:10, yudi v wrote:
I will be wiping partitions on my hard drive before sending it back to
the manufacturer for replacement.
I usually prefer dd if=/dev/urandom of=/dev/sdX# for the unencrypted
partitions and just over write the first few sectors on the LUKS
partition to
Am Dienstag, 13. September 2011 schrieb yudi v:
I will be wiping partitions on my hard drive before sending it back to
the manufacturer for replacement.
I usually prefer dd if=/dev/urandom of=/dev/sdX# for the unencrypted
partitions and just over write the first few sectors on the LUKS
On Sep 13, 2011 10:05 AM, yudi v yudi@gmail.com wrote:
I just want to hear some opinions as to what precautions you take before
parting with hard drives. I would be very interested to hear from SSD
owners.
So, this is sort of an interesting question I haven't had to deal with yet
(and I
On Qua, 14 Set 2011, shawn wilson wrote:
I don't get that warm and fuzzy feeling by drilling an ssd.
So, what is the best way for an individual to destroy an ssd?
I'd say that if you drill the memory chips in the SSD it is destroyed
beyond recovery.
--
There are three things men can do
On Sep 14, 2011 8:33 AM, Eduardo M KALINOWSKI edua...@kalinowski.com.br
wrote:
On Qua, 14 Set 2011, shawn wilson wrote:
I don't get that warm and fuzzy feeling by drilling an ssd.
So, what is the best way for an individual to destroy an ssd?
I'd say that if you drill the memory chips in
On Wed, Sep 14, 2011 at 7:39 PM, shawn wilson ag4ve...@gmail.com wrote:
On Sep 14, 2011 8:33 AM, Eduardo M KALINOWSKI edua...@kalinowski.com.br
wrote:
On Qua, 14 Set 2011, shawn wilson wrote:
I don't get that warm and fuzzy feeling by drilling an ssd.
So, what is the best way for an
On Sep 14, 2011 8:51 AM, Robert Parker rlp1...@gmail.com wrote:
On Wed, Sep 14, 2011 at 7:39 PM, shawn wilson ag4ve...@gmail.com wrote:
On Sep 14, 2011 8:33 AM, Eduardo M KALINOWSKI
edua...@kalinowski.com.br
wrote:
On Qua, 14 Set 2011, shawn wilson wrote:
I don't get that warm and
For SSDs or harddisk which do encryption internally - with or without
encryption password in BIOS - an ATA Secure Erase should be enough:
http://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
Search site:kernel.org secure erase on Google and use webcache as long
as kernel.org is down.
I
Am Mittwoch, 14. September 2011 schrieb yudi v:
For SSDs or harddisk which do encryption internally - with or without
encryption password in BIOS - an ATA Secure Erase should be enough:
http://ata.wiki.kernel.org/index.php/ATA_Secure_Erase
Search site:kernel.org secure erase on
I used an external USB/eSATA case hooked up via eSATA and then bootet
GRML. The BIOS did not protect the external drive and I was able to
transfer the ATA Secure Command via eSATA. I bet it might not work via USB
tough.
Booted from ubuntu live USB, checked if the internal disk was frozen,
On Wed, Sep 14, 2011 at 09:55, Aaron Toponce aaron.topo...@gmail.com wrote:
On Wed, Sep 14, 2011 at 09:02:42AM -0400, shawn wilson wrote:
On Sep 14, 2011 8:51 AM, Robert Parker rlp1...@gmail.com wrote:
What's wrong with dd if=/dev/zero of=/dev/sdX for SSDs?
Well, I remember hearing that data
I will be wiping partitions on my hard drive before sending it back to the
manufacturer for replacement.
I usually prefer dd if=/dev/urandom of=/dev/sdX# for the unencrypted
partitions and just over write the first few sectors on the LUKS partition
to destroy the header file.
I just want to
--- On Tue, 9/13/11, yudi v yudi@gmail.com wrote:
I will be wiping partitions on my hard drive before sending it back to
the manufacturer for replacement.
I usually prefer dd if=/dev/urandom of=/dev/sdX# for the unencrypted
partitions and just over write the first few sectors on the
2011/9/13 Aaron Toponce aaron.topo...@gmail.com:
On 09/13/2011 08:04 AM, yudi v wrote:
I will be wiping partitions on my hard drive before sending it back to
the manufacturer for replacement.
I usually prefer dd if=/dev/urandom of=/dev/sdX# for the unencrypted
partitions and just over
I would do: dd if=/dev/urandom of=/dev/sdX (Note there is no partition
number.)
I only use sdX# for partitions that are unencrypted. It's redundant to
write over a LUKS container.
--
Kind regards,
Yudi
If the drive has encrypted data, then you don't need to wipe much. I
would do the following, and call it good:
dd if=/dev/urandom of=/dev/sdX bs=1M count=100
This will wipe pseudorandom data to the first 100MB of the drive, which
should wipe out any of the encrypted header
37 matches
Mail list logo