Of course, a _secure_ file wiper needs to do more than just write 0's
to the disk. With the right equipment, that's fairly easy to recover
the data. A more secure file wiper writes patterns, including random
data, to each block to make the disk unrecoverable.

DBAN does a very good job of this, and so do others (GNU shred from
GNU coreutils is very nice.)


On 9/24/07, Eric Auer <[EMAIL PROTECTED]> wrote:
> Hi Alain,
> I think in particular a slack space wiper would be nice.
> Something which opens each file, adds 00s to make the
> size a multiple of the cluster size, makes sure that the
> changes are written to disk, and finally truncates the
> file to normal size again. You can combine this with a
> tool which creates a bogus file to fill all free space.
> Those 2 steps together give you a tool to wipe empty
> space without using sector based low level access :-).
> Note: This would not wipe unused / deleted directory
> entries (you could add a bit of that by creating a
> bunch of temp files to make directory size a multiple
> of cluster size) but on the other hand it would be
> quite nice that the tools suggested above would work
> even in Windows and for non-FAT filesystems and with-
> out the risks of messing with lowlevel access :-)
> Eric

This SF.net email is sponsored by: Microsoft
Defy all challenges. Microsoft(R) Visual Studio 2005.
Freedos-user mailing list

Reply via email to