There is a federal standard somewhere. I implemented it some years ago for
DOS disks for a cleaning classified information, but I can't remember the
number. Basically, the federal standard requires writing AA, then 55,
then FF to remove any residual trace of the bit that was there. This must
be done to every byte location on disk.
You can probably make a block for each of these values, and then use the
dd command three times to do the writes.
--Dean
On Mon, 6 May 2002 [EMAIL PROTECTED] wrote:
> On Mon, May 06, 2002 at 02:37:45PM -0400, Sharon Nagao wrote:
>
> > Does anyone know of an application that can overwrite
> > a file such that it is virtually impossible to read
> > the data in the file back from disk using forensic
> > methods on unix machines (Irix in particular).
>
> Searching Freshmeat <http://freshmeat.net/> in the "Software" section
> turns up a bunch of promising shell utilities, most (all?) of which
> should work on Irix. Apparently, examples include `overwrite`,
> `wipe`, `srm` and "secure delete." I've also seen a `saferm`
> mentioned somewhere, but didn't see it on Freshmeat.
>
> Personally, I still do something like:
> dd if=/dev/urandom of=file_to_erase bs=123k count=1
> (but I've rarely been accused of keeping up with the times :-)
>
> If you do it manually, the key thing is to not leave temporary or
> otherwise orphaned copies on disk, as most editors will do.
>
>
> ---
> Send mail for the `bblisa' mailing list to `[EMAIL PROTECTED]'.
> Mail administrative requests to `[EMAIL PROTECTED]'.
>
---
Send mail for the `bblisa' mailing list to `[EMAIL PROTECTED]'.
Mail administrative requests to `[EMAIL PROTECTED]'.