LinuxQuestions.org
Latest LQ Deal: Latest LQ Deals
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Non-*NIX Forums > General
User Name
Password
General This forum is for non-technical general discussion which can include both Linux and non-Linux topics. Have fun!

Notices


View Poll Results: UNIX is better than WINDOWS
what?HELLO.i am UNIX. the best! 605 68.52%
whooa, wait a minute. Windows is BETTER than UNIX 48 5.44%
hoo-boy..i don't like both. 64 7.25%
errr...i don't know, what is UNIX afterall? 11 1.25%
windows?never heard of it... 155 17.55%
Voters: 883. You may not vote on this poll

Closed Thread
  Search this Thread
Old 02-23-2008, 03:33 AM   #1936
ussr_1991
LQ Newbie
 
Registered: Jan 2007
Location: Singapore
Distribution: Windows 7 / 8.1, Fedora 21, OSX 10.10
Posts: 26

Rep: Reputation: 15

Quote:
Originally Posted by b0uncer View Post
And the limits of the environment, which depends on how it was programmed. But typically it stretches far beyond the graphical interface's capabilities, and mostly users' nerves.

If you really wanted to securely delete data, you wouldn't shred it, but instead use strong magnetic fields to mess up the magnetic media (or equivalent for other type media), then smash it into pieces and melt down in a couple thousand Kelvins temperature. And maybe eat in your porridge, to make sure nobody wants to touch the thing after that..

It would be nice to see how people reacted if some new version of Windows presented the users with a whole new command line environment, along with all the apps (well, their equivalents) Unix/Linux users are familiar with already. Like expanding DOS to the next dimension.
Nice way of doing without even technical details. But that applies to a HD that seemed to be a suffering from hardware failure then I will do it. Otherwise, my heart may breaks (Chinese called 心痛) since it is just working fine and intended to give to poorer people who may even think that a 20 or 40 GB of HDD is enough for them.

However, this seemed to workable only if you heat on a stove, or you own a heavy metal industries that does wielding etc. (Or someone with furnace.)
 
Old 02-23-2008, 03:36 AM   #1937
ussr_1991
LQ Newbie
 
Registered: Jan 2007
Location: Singapore
Distribution: Windows 7 / 8.1, Fedora 21, OSX 10.10
Posts: 26

Rep: Reputation: 15
Quote:
Originally Posted by schneidz View Post
pop quiz hot shot:

what do you do?, what do you do ?
this is a fictional story in the case. It seemed that there were cases across the globe where people taped some illegal stuffs from abuse of power to sex scandal and released to the press or authorities (Mainly Illegal activity rather than sex scandal unless it is a rape where so far I had heard none of it.)
 
Old 02-23-2008, 03:44 AM   #1938
ussr_1991
LQ Newbie
 
Registered: Jan 2007
Location: Singapore
Distribution: Windows 7 / 8.1, Fedora 21, OSX 10.10
Posts: 26

Rep: Reputation: 15
Quote:
Originally Posted by {BBI}Nexus{BBI} View Post
That is what the package manager is for, it should help to alleviate any dependency issues automatically for the average computer user who isn't an expert.
May not. I have tried Ubuntu 6.06 with some codec problems (Namely using Gstreamer codec to play RealMedia Files only workable in Mplayer. But I like Totem which does not work on playing RM files (It is either with Video no Sound or With Sound but no Video,depending you use Xine or Gstreamer.) So I tried to upgrade to 2.18 of Totem but sorry even in package manager,you need to upgrade some system related packages. If you download from its offical sites for newest package,more problem comes by. You will see this package is not compatible, that also cannot. And you will end up uninstalling a lot of system package and yet cannot install the updated version. The worst I got was to see my Ubuntu does not work at all. Unable to open the window! And I had to reinstall it.

All these was not updated by its Update Manager. (That is by using a Fesity system package to install on 6.06)
 
Old 02-23-2008, 04:10 AM   #1939
ussr_1991
LQ Newbie
 
Registered: Jan 2007
Location: Singapore
Distribution: Windows 7 / 8.1, Fedora 21, OSX 10.10
Posts: 26

Rep: Reputation: 15
Quote:
Originally Posted by dracolich View Post
I don't remember Java being available for Windows 1.0 or 2.0. In 3.11, however, I remember using early versions of Netscape Navigator and Java. Back then Java mostly allowed minor audio and animation effects because internet connections were still primarily dial-up with 33.6Kbps. T1 was still new and Cable and DSL hadn't started yet.
O so ok, back then I did not use any computers. By then, I was not even in Primary School yet. My first experience on computers was Windows 95, where I rarely used it on my school. I dont even own them until I was 12.So I might be mistaken for Java's history.

Quote:
Originally Posted by dracolich View Post
If you use Firefox then everything is saved in it's Cache folder. You can use the portable version of Firefox that already has Cache disabled or edit the appropriate entry in about:config to disable it. Then tell it to always clear private data, which will include cookies and history, when it closes. I always set mine up to not remember what I type in fields or passwords. And in Linux I have my Firefox cache directory completely deleted during shutdown.
For me, I always set not to remember any history. for cache, well I scared the loading time will be like a tortoise, so I will set some cache regardless my Mac Notebook, or PC with Windows or Linux. However, I dont ask it to clear the data because I dont think it deletes with some pass (Not to mention 35, I dont think it does at least a pass). I use CCleaner on Windows XP, Cache Out X on my Mac OS X 10.4.11 but nothing on Linux. I am not too sure how to do that securely.

Quote:
Originally Posted by dracolich View Post
If your worried about sending financial information and credit card numbers over the internet, the best security is to just not do it. But if you must, and you feel you want to thoroughly erase the evidence, use the dd command I previously posted, with as many passes as you like, after deleting those temp files. The command, modified for single line, is:
Code:
dd if=/dev/urandom > fileconsumingallfreespace ;; rm fileconsumingallfreespace
You can apply this to any partition by putting the appropriate /dev/hd** in front of fileconsumingallfreespace
I am just wondering. Just like a song,the lyrics is trying to bring some meaning over it. so is it true that dd if=/dev/urandom > fileconsumingallfreespace means to writ e all the free space with random character and leave it there while the laterral rm fileconsumingallfreespace means to remove the files written on the free space so that we had throughly removed the evidence but without wasting our disk space forever? Also to use ;; with a space before and after each command means to tell the computer to execute 2 commands concurrently (So by another example of using CLI rm /home/user/videos ;; rm /home/user/music ;; rm /home/user/pictures means to remove User's videos, then remove User's music which finally to remove User's pictures?)

By the way,does this command removes all partiton and physical HDD's free space or only hda1 if I do not use /dev/hd** before fileconsumingallfreespace?

Final Conclusion: While this is the best command, it will take days to do it completely especially one with 300GB of HDD compared to a 6GB HDD.
So it might not be pratical to do it frequently. Internet Cleaners, on the other hand, brings more convenience by just removing the cookies and caches etc without taking hours unless it is full of online movies/animation with at least half hour long.

My starting of securely delete files is a "broad topic" where attempts to cover how to remove caches and cookies that is related to Internet Browsing to Non Internet Browsing related stuffs like personal agreements or simply a diary that you do not intend to release now but your PC is broke at untimely now and attempt to store it onto another location such as portable HDD,thumbdrive etc before deleting it that even the repairman cannot attempt to look at it.
 
Old 02-23-2008, 09:04 AM   #1940
rocket357
Member
 
Registered: Mar 2007
Location: 127.0.0.1
Distribution: OpenBSD-CURRENT
Posts: 485
Blog Entries: 187

Rep: Reputation: 74
Quote:
Originally Posted by {BBI}Nexus{BBI} View Post
Now you've finished with that encryted file what do you do next?

1. Hit the delete key and take comfort in the knowledge that even if the file is recovered it's encrypted anyway.

or

2. Secure delete it to make recovery of said file nigh impossible!!
Personally, I secure delete it =P My point was that given a reasonably good memory and a few "tricks", you shouldn't have to store sensitive information in electronic format.

But, let's assume there's no way around it...you MUST store some critical bit of information on your hard drive...it's best to encrypt it (with strong encryption...do the research and LEARN before you settle on plain old DES (or similar)) and securely delete it when you're finished.

I believe if it's important enough to rate a secure delete, you should consider setting up a small partition (50-100 meg, perhaps?) (you DID leave a bit of empty space on that 500 GB hard drive, right? heh) that can be encrypted, and if a secure delete is warranted then running this:
Code:
host dir # rm '<secure partition>/<sensitive file>' 
host dir # cat /dev/urandom > '<secure partition>/<some big file>' 
host dir # rm '<secure partition>/<some big file>'
won't take weeks (as pointed out by ussr_1991)...and it's just as "securely deleted" as it would be otherwise (especially if you run the second and third command repeatedly). (And it'd be wise to run encrypted swap that gets "zeroed out" when you shutdown, just in case =)

Last edited by rocket357; 02-23-2008 at 09:17 AM.
 
Old 02-23-2008, 11:12 AM   #1941
dracolich
Senior Member
 
Registered: Jul 2005
Distribution: Slackware
Posts: 1,274

Rep: Reputation: 63
Quote:
Originally Posted by ussr_1991 View Post
I am just wondering. Just like a song,the lyrics is trying to bring some meaning over it. so is it true that dd if=/dev/urandom > fileconsumingallfreespace means to writ e all the free space with random character and leave it there while the laterral rm fileconsumingallfreespace means to remove the files written on the free space so that we had throughly removed the evidence but without wasting our disk space forever? Also to use ;; with a space before and after each command means to tell the computer to execute 2 commands concurrently (So by another example of using CLI rm /home/user/videos ;; rm /home/user/music ;; rm /home/user/pictures means to remove User's videos, then remove User's music which finally to remove User's pictures?)
Quote:
By the way,does this command removes all partiton and physical HDD's free space or only hda1 if I do not use /dev/hd** before fileconsumingallfreespace?
To answer your questions: the > tells dd to direct its output to the single file named ... which will consume the remaining free space on the target partition. Without specifying a partition it will use the current location. If your target is mounted on /mnt/WINNT, for example, then you would want to specify that in the command. I think I meant just one ; because dd will end with an error when the disk is full. I use ; so that when dd finishes it runs rm immediately after to remove the new file.
Quote:
Final Conclusion: While this is the best command, it will take days to do it completely especially one with 300GB of HDD compared to a 6GB HDD.
Is the target partition the full 300GB or is the disk split into multiple partitions?
 
Old 02-23-2008, 01:55 PM   #1942
gymnart
Member
 
Registered: Oct 2005
Distribution: SUSE 11.4
Posts: 331

Rep: Reputation: 30
@ AceofSpades19
Thanks for the suggestion. I can add it to the other suggestion to try out Slackware.

@ {BBI}Nexus{BBI}
If a kernel panic happens in runlevel 3, I wouldn't know what to do. Kernel panic = I panic too!
 
Old 02-23-2008, 04:32 PM   #1943
{BBI}Nexus{BBI}
Senior Member
 
Registered: Jan 2005
Location: Nottingham, UK
Distribution: Mageia 6, KDE Neon
Posts: 4,313

Rep: Reputation: 212Reputation: 212Reputation: 212
Quote:
Originally Posted by gymnart View Post
@ {BBI}Nexus{BBI}
If a kernel panic happens in runlevel 3, I wouldn't know what to do. Kernel panic = I panic too!
LOL, fair enough.
 
Old 02-23-2008, 07:57 PM   #1944
AceofSpades19
Senior Member
 
Registered: Feb 2007
Location: Chilliwack,BC.Canada
Distribution: Slackware64 -current
Posts: 2,079

Rep: Reputation: 58
@ussr_1991, I have already said that there is no need to do a "secure" delete on an ext3 filesystem because it actually deletes the stuff when you do a rm
 
Old 02-23-2008, 09:08 PM   #1945
{BBI}Nexus{BBI}
Senior Member
 
Registered: Jan 2005
Location: Nottingham, UK
Distribution: Mageia 6, KDE Neon
Posts: 4,313

Rep: Reputation: 212Reputation: 212Reputation: 212
Quote:
Originally Posted by AceofSpades19 View Post
@ussr_1991, I have already said that there is no need to do a "secure" delete on an ext3 filesystem because it actually deletes the stuff when you do a rm
Does that also mean these files cannot be retrieved by programs such as 'Encase'?
 
Old 02-23-2008, 09:24 PM   #1946
AceofSpades19
Senior Member
 
Registered: Feb 2007
Location: Chilliwack,BC.Canada
Distribution: Slackware64 -current
Posts: 2,079

Rep: Reputation: 58
Quote:
Originally Posted by {BBI}Nexus{BBI} View Post
Does that also mean these files cannot be retrieved by programs such as 'Encase'?
Quote:
Undeletion

Unlike ext2, ext3 zeroes out block pointers in the inodes of deleted files. It does this to simplify read-write access to the filesystem when the journal is being replayed after an unclean mount. This, however, effectively prevents files from being undeleted. The user's only recourse is to grep the hard drive for data known to signal the start and end of the file. This provides slightly more secure deletion than ext2, which can be either an advantage or a disadvantage.
from wikipedia
 
Old 02-23-2008, 11:22 PM   #1947
rocket357
Member
 
Registered: Mar 2007
Location: 127.0.0.1
Distribution: OpenBSD-CURRENT
Posts: 485
Blog Entries: 187

Rep: Reputation: 74
AceOfSpades19,

I think that was the entire point of ussr_1991's original post...the pointers are overwritten, but the original data itself is not, meaning someone with enough time, know-how, and effort could "undelete" the file. (Correct me if I a) misread your post, Ace, or b) didn't get the point of your posts, ussr).

Quote:
Originally Posted by rm man page
Note that if you use rm to remove a file, it is usually possible to recover the contents of that file. If you want more assurance that the contents are truly unrecoverable, consider using shred.
Time and know-how are the biggies, as someone who attempts this kind of undelete is obviously motivated enough to put in the effort...and given the instance of a hard drive getting stolen (or sent to a shop to get worked on, in which case the repairman can simply dd the data off the drive to a backup), it seems the "bad guy's" know-how is the limiting factor.

And worse, shred (which uses a default 25 passes from /dev/urandom to overwrite a file (and optionally delete it)) states in it's man page that journaled file systems provide some difficulty in securely deleting a file:

Quote:
Originally Posted by shred man page
In the case of ext3 file systems, the above disclaimer applies (and shred is thus of limited effectiveness) only in data=journal mode, which journals file data in addition to just metadata. In both the data=ordered (default) and data=writeback modes, shred works as usual.
Depending on how ext3 is mounted from the start (know thy distro!), it may be possible to recover a sensitive data file even after running dd or cat /dev/urandom on it multiple times...

Last edited by rocket357; 02-23-2008 at 11:25 PM.
 
Old 02-24-2008, 12:25 AM   #1948
AceofSpades19
Senior Member
 
Registered: Feb 2007
Location: Chilliwack,BC.Canada
Distribution: Slackware64 -current
Posts: 2,079

Rep: Reputation: 58
Quote:
Originally Posted by rocket357 View Post
AceOfSpades19,

I think that was the entire point of ussr_1991's original post...the pointers are overwritten, but the original data itself is not, meaning someone with enough time, know-how, and effort could "undelete" the file. (Correct me if I a) misread your post, Ace, or b) didn't get the point of your posts, ussr).



Time and know-how are the biggies, as someone who attempts this kind of undelete is obviously motivated enough to put in the effort...and given the instance of a hard drive getting stolen (or sent to a shop to get worked on, in which case the repairman can simply dd the data off the drive to a backup), it seems the "bad guy's" know-how is the limiting factor.

And worse, shred (which uses a default 25 passes from /dev/urandom to overwrite a file (and optionally delete it)) states in it's man page that journaled file systems provide some difficulty in securely deleting a file:



Depending on how ext3 is mounted from the start (know thy distro!), it may be possible to recover a sensitive data file even after running dd or cat /dev/urandom on it multiple times...
I honestly don't think someone would do that unless you had like top secret goverment info or something like that. I think secure delete on a home desktop pc running linux is just being paranoid, I could see maybe on a business laptop or a government computer. I doubt someone would go through that much trouble to get personal info for one person, its a pretty impractical way to get money, unless the person is rich or something.
 
Old 02-24-2008, 12:39 AM   #1949
rocket357
Member
 
Registered: Mar 2007
Location: 127.0.0.1
Distribution: OpenBSD-CURRENT
Posts: 485
Blog Entries: 187

Rep: Reputation: 74
Quote:
Originally Posted by AceofSpades19 View Post
I honestly don't think someone would do that unless you had like top secret goverment info or something like that. I think secure delete on a home desktop pc running linux is just being paranoid, I could see maybe on a business laptop or a government computer. I doubt someone would go through that much trouble to get personal info for one person, its a pretty impractical way to get money, unless the person is rich or something.
This is true. It's far easier to scam the weak (paypal scams, anyone?) than undelete personal info from a PC...unless we're talking about the celebrity who had 1300 photos (ok, ok...it's likely that they were rich and could be blackmailed)...but the question is not about the likelihood of such an attack...it's about "can this file be undeleted against my wishes?"

This question cannot be answered without reviewing all of the details. I'm a paranoid person...perhaps ussr_1991 is paranoid, too? The likelihood of an attack is a different subject from the availability of an attack, hence my last post.

Last edited by rocket357; 02-24-2008 at 12:40 AM.
 
Old 02-24-2008, 07:42 AM   #1950
ussr_1991
LQ Newbie
 
Registered: Jan 2007
Location: Singapore
Distribution: Windows 7 / 8.1, Fedora 21, OSX 10.10
Posts: 26

Rep: Reputation: 15
Quote:
Originally Posted by rocket357 View Post
Personally, I secure delete it =P My point was that given a reasonably good memory and a few "tricks", you shouldn't have to store sensitive information in electronic format.

But, let's assume there's no way around it...you MUST store some critical bit of information on your hard drive...it's best to encrypt it (with strong encryption...do the research and LEARN before you settle on plain old DES (or similar)) and securely delete it when you're finished.

I believe if it's important enough to rate a secure delete, you should consider setting up a small partition (50-100 meg, perhaps?) (you DID leave a bit of empty space on that 500 GB hard drive, right? heh) that can be encrypted, and if a secure delete is warranted then running this:
Code:
host dir # rm '<secure partition>/<sensitive file>' 
host dir # cat /dev/urandom > '<secure partition>/<some big file>' 
host dir # rm '<secure partition>/<some big file>'
won't take weeks (as pointed out by ussr_1991)...and it's just as "securely deleted" as it would be otherwise (especially if you run the second and third command repeatedly). (And it'd be wise to run encrypted swap that gets "zeroed out" when you shutdown, just in case =)
Bottomline to readers who want to safely remove files: Set the browser cache to a not more than a GB partition especially when user with more than 80G HDD.

If the company/work related confidental is not a lot, use a partition HDD with about 100M as above stated. Do encrypt the files.

I think the above suggestion is achievable even by a novice.
 
  


Closed Thread

Tags
business, kenny's_playground, microsoft, register, technical, windows, worm, wtf



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Linux-windows Dual boot question when upgrading from windows 2000 to XP sarikalinux Linux - Newbie 1 03-09-2006 02:21 PM
Solution Dual Boot Windows & Linux [ALL DONE IN WINDOWS] No Linux terminology DSargeant Linux - Newbie 35 02-07-2006 03:29 PM
Solution Dual Boot Windows & Linux [ALL DONE IN WINDOWS] No Linux terminology DSargeant Linux - Newbie 4 11-10-2005 11:37 AM
Red Hat Linux 9 + Windows Server 2003 + Windows XP + Fedora in same domain wolfy339 Linux - Networking 5 03-02-2005 06:03 AM

LinuxQuestions.org > Forums > Non-*NIX Forums > General

All times are GMT -5. The time now is 05:55 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration