Linux - HardwareThis forum is for Hardware issues.
Having trouble installing a piece of hardware? Want to know if that peripheral is compatible with Linux?
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
Considering the strangeness of this question, perhaps you should explain what it is you are attempting to accomplish. Why are you wanting to erase all of the ram on a running system?
True on the cold boot issue. One with physical access to any system could much more easily attack it.
As to what could be removed from a normal power off (say 10 minutes) from a system would be somewhat unknown. I'd suspect going to a full power off with ac removed would help secure it more.
The question is inadequate. All the guessing is interesting.
On military systems they worry about this very thing. RAM that has held the secret code can be read after power off by grinding down the wafer and probing with an ion beam. There have been several proposed solutions to defeat this. It would be another assumption that the original poster was or was not worried about this level of exposure.
For purposes of donating or recycling a computer, power off would be adequate for the RAM, but not for the hard drive, as has been noted.
If it has held sensitive information, then a power cycle with any other bootable binary would adequately invalidate any residual RAM charges for most purposes. A standalone memtest program has been used for this purpose.
Hard drives are also hard to entirely invalidate. The dd solution would get the obvious readable data, but given sufficient importance, examining residual patterns in the magnetic disk layer can reveal most of the original information. Some organizations use a drill through the hard drive. I have heard that some military use a commercial shredder on their hard drives.
Distribution: Debian /Jessie/Stretch/Sid, Linux Mint DE
Posts: 5,195
Rep:
@selfprogrammed
I take it your post was purely academic (although interesting). If the OP had access to such techniques, or his data has to be sucured against such techniques, he would not be posting this question in LQ.
And in case he is in a position where this is relevant and he did post here, he is totally unsuitable for the job.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.