LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 09-12-2017, 04:26 PM   #16
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,665

Rep: Reputation: Disabled

I concur with odaho. Properly configured Linux system is fully capable to keep its nose clean without wonderwares such as BleachBit.
 
Old 09-12-2017, 04:43 PM   #17
Zyblin
Member
 
Registered: Oct 2013
Distribution: Linux Mint 18.3 (64)
Posts: 185

Rep: Reputation: 20
lol. I seem to be the only one who likes those programs here. I will just say I respectfully disagree, well in part anyways. For the average user it makes things easier. I set up Ccleaner on Windows computers for family and friends. I told them what to do and what not to do. They listened and never had issues. This in turn made it easier on me and I ended up working on their computers much less, (which is good since I refuse to charge family and friends for my time, I only charge for the parts, etc., IF needed.)

Last edited by Zyblin; 09-12-2017 at 04:47 PM.
 
Old 09-13-2017, 10:56 AM   #18
ondoho
LQ Addict
 
Registered: Dec 2013
Posts: 19,872
Blog Entries: 12

Rep: Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053Reputation: 6053
Quote:
Originally Posted by Emerson View Post
Properly configured Linux system is fully capable to keep its nose clean without wonderwares such as BleachBit.
and other files that clog up my $HOME (but have no impact on performance) couldn't be identified by bleachbit anyway.

or, if it does, i would really like to know how it does it.

scenario:
i install a program, run it once. on first run it creates a directory under ~/.config with maybe 1 or 2 files in it. after uninstalling the program, this directory and the files therein stay behind.
does bleachbit have a mechanism to recognize this, and offer to remove it?
 
Old 09-13-2017, 11:24 AM   #19
Zyblin
Member
 
Registered: Oct 2013
Distribution: Linux Mint 18.3 (64)
Posts: 185

Rep: Reputation: 20
Quote:
Originally Posted by ondoho View Post
and other files that clog up my $HOME (but have no impact on performance) couldn't be identified by bleachbit anyway.

or, if it does, i would really like to know how it does it.

scenario:
i install a program, run it once. on first run it creates a directory under ~/.config with maybe 1 or 2 files in it. after uninstalling the program, this directory and the files therein stay behind.
does bleachbit have a mechanism to recognize this, and offer to remove it?
For that specifically I do not believe so, at least not out of the box. What I like is that it covers basics easily and quickly so I can then take care of the rest on my own if, and when, needed. This is what they say at their website. It is also open source, unlike Ccleaner. Maybe some more people can work on it to add even more features.

Quote:
Features

BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy.

* Delete your private files so completely that "even God can't read them" according to South Carolina Representative Trey Gowdy.
* Simple operation: read the descriptions, check the boxes you want, click preview, and click delete.
* Multi-platform: Linux and Windows
* Free of charge and no money trail
* Free to share, learn, and modify (open source)
* No adware, spyware, malware, browser toolbars, or "value-added software"
* Translated to 64 languages besides American English
* Shred files to hide their contents and prevent data recovery
* Shred any file (such as a spreadsheet on your desktop)
* Overwrite free disk space to hide previously deleted files
* Portable app for Windows: run without installation
* Command line interface for scripting and automation
* CleanerML allows anyone to write a new cleaner using XML
* Automatically import and update winapp2.ini cleaner files (a separate download) giving Windows users access to 2500+ additional cleaners
* Frequent software updates with new features

Uses

Use BleachBit to:

* Free disk space
* Reduce the size of backups and the time to create them by removing unnecessary files
* Maintain privacy
* Improve system performance (by vacuuming the Firefox database, for example)
* Prepare whole disk images for compression (common for "ghost" backups and virtual machines) by wiping free disk sp
I want to add that I do not use the wipe free disk feature and do not recommend it for everyone, if at all.

From wikipedia,

Quote:
Technology

BleachBit is written in the Python programming language and uses PyGTK.

Most of BleachBit's cleaners are written in CleanerML, an XML-based markup language for writing cleaners which is an open standard. CleanerML does not only deal with deleting files, but also executes more specialized actions such as vacuuming an SQLite database (used, for example, to clean Yum).

BleachBit's file shredder uses only a single, "secure" pass because its developers believe that there is a lack of evidence that multiple passes, such as the 35-pass Gutmann method, are more effective. They also assert that multiple passes are significantly slower and may give the user a false sense of security by overshadowing other ways privacy may be compromised.
Also if people need to really shred files more than bleachbit offers, that can be done in a terminal with shred -u -v -z -n35 /home/user/name.OFfile, for example. For those not familiar with this command one can get more information about that by opening your favorite terminal and typing shred --help BUT those who are new to this should understand there is NO going back once you shred a file. Make sure the correct file is being shredded correctly and you don't end up shredding the wrong files or worse.

Last edited by Zyblin; 09-13-2017 at 12:03 PM.
 
Old 09-14-2017, 01:37 PM   #20
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Rep: Reputation: 78
i am seeing fundamentals being left out, in many many areas of computing. if the system is found to be hacked then it should be declared a decomm and restored (rebuilt from a build doc). if there is no build doc then someone is not doing their job. running tools to "find" and "clean" on a prod system is ok to do in the lab, not ok to keep it in production.
 
1 members found this post helpful.
Old 09-14-2017, 01:48 PM   #21
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,665

Rep: Reputation: Disabled
Indeed. Except if it is a defunct Windows virus sitting in browser cache, it can be safely ignored.
 
Old 09-14-2017, 02:03 PM   #22
Linux_Kidd
Member
 
Registered: Jan 2006
Location: USA
Posts: 737

Rep: Reputation: 78
Quote:
Originally Posted by Emerson View Post
Indeed. Except if it is a defunct Windows virus sitting in browser cache, it can be safely ignored.
browser cache, on a prod server ?? maybe a end-user system, and in that case i might still remove that user item and replace it with a new one.
 
Old 09-14-2017, 02:38 PM   #23
Emerson
LQ Sage
 
Registered: Nov 2004
Location: Saint Amant, Acadiana
Distribution: Gentoo ~amd64
Posts: 7,665

Rep: Reputation: Disabled
Of course I didn't mean production server, it was just a remark regarding desktop systems.
 
Old 09-14-2017, 06:19 PM   #24
unSpawn
Moderator
 
Registered: May 2001
Posts: 29,415
Blog Entries: 55

Rep: Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600Reputation: 3600
Quote:
Originally Posted by ondoho View Post
^ i prefer trolls that actually bother to formulate proper replies.
Agree. LQ members posting questions in this forum require the attention and expertise of fellow members who actually care to offer friendly and constructive help.

@All: anyone offering any "advice" not catering to the OPs specific needs (like "use a VPN", period) or engaging in mindless banter will find me nudging you towards posting only in /General (cuz that's where the "quality" of your posts will appreciated "better" ;-p).
 
Old 09-23-2017, 03:00 AM   #25
d_K
Member
 
Registered: Aug 2016
Posts: 32

Rep: Reputation: Disabled
Exclamation

Quote:
Originally Posted by Zyblin View Post
...if people need to really shred files more...
I've yet to come across any credible documentation stating that overwriting target data with 1 pass of zeros on modern hard drives (and SSDs excluding swap partitions) is anyhow "more vulnerable to data recovery" versus other methods, for all practical applications. If you find any such documentation, let me know.

Code:
sudo shred -vzn 0 [target]
 
  


Reply

Tags
exploit, trojan, virus



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
[SOLVED] Turla trojan for LInux beachboy2 Linux - Security 5 07-31-2015 11:52 PM
Trojan scan/removal for linux Whitestone Linux - Security 6 08-15-2005 08:54 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 04:59 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration