Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
lol. I seem to be the only one who likes those programs here. I will just say I respectfully disagree, well in part anyways. For the average user it makes things easier. I set up Ccleaner on Windows computers for family and friends. I told them what to do and what not to do. They listened and never had issues. This in turn made it easier on me and I ended up working on their computers much less, (which is good since I refuse to charge family and friends for my time, I only charge for the parts, etc., IF needed.)
Properly configured Linux system is fully capable to keep its nose clean without wonderwares such as BleachBit.
and other files that clog up my $HOME (but have no impact on performance) couldn't be identified by bleachbit anyway.
or, if it does, i would really like to know how it does it.
scenario:
i install a program, run it once. on first run it creates a directory under ~/.config with maybe 1 or 2 files in it. after uninstalling the program, this directory and the files therein stay behind.
does bleachbit have a mechanism to recognize this, and offer to remove it?
and other files that clog up my $HOME (but have no impact on performance) couldn't be identified by bleachbit anyway.
or, if it does, i would really like to know how it does it.
scenario:
i install a program, run it once. on first run it creates a directory under ~/.config with maybe 1 or 2 files in it. after uninstalling the program, this directory and the files therein stay behind.
does bleachbit have a mechanism to recognize this, and offer to remove it?
For that specifically I do not believe so, at least not out of the box. What I like is that it covers basics easily and quickly so I can then take care of the rest on my own if, and when, needed. This is what they say at their website. It is also open source, unlike Ccleaner. Maybe some more people can work on it to add even more features.
Quote:
Features
BleachBit has many useful features designed to help you easily clean your computer to free space and maintain privacy.
* Delete your private files so completely that "even God can't read them" according to South Carolina Representative Trey Gowdy.
* Simple operation: read the descriptions, check the boxes you want, click preview, and click delete.
* Multi-platform: Linux and Windows
* Free of charge and no money trail * Free to share, learn, and modify (open source)
* No adware, spyware, malware, browser toolbars, or "value-added software"
* Translated to 64 languages besides American English
* Shred files to hide their contents and prevent data recovery
* Shred any file (such as a spreadsheet on your desktop)
* Overwrite free disk space to hide previously deleted files
* Portable app for Windows: run without installation * Command line interface for scripting and automation * CleanerML allows anyone to write a new cleaner using XML
* Automatically import and update winapp2.ini cleaner files (a separate download) giving Windows users access to 2500+ additional cleaners
* Frequent software updates with new features
Uses
Use BleachBit to:
* Free disk space
* Reduce the size of backups and the time to create them by removing unnecessary files * Maintain privacy * Improve system performance (by vacuuming the Firefox database, for example)
* Prepare whole disk images for compression (common for "ghost" backups and virtual machines) by wiping free disk sp
I want to add that I do not use the wipe free disk feature and do not recommend it for everyone, if at all.
From wikipedia,
Quote:
Technology
BleachBit is written in the Python programming language and uses PyGTK.
Most of BleachBit's cleaners are written in CleanerML, an XML-based markup language for writing cleaners which is an open standard. CleanerML does not only deal with deleting files, but also executes more specialized actions such as vacuuming an SQLite database (used, for example, to clean Yum).
BleachBit's file shredder uses only a single, "secure" pass because its developers believe that there is a lack of evidence that multiple passes, such as the 35-pass Gutmann method, are more effective. They also assert that multiple passes are significantly slower and may give the user a false sense of security by overshadowing other ways privacy may be compromised.
Also if people need to really shred files more than bleachbit offers, that can be done in a terminal with shred -u -v -z -n35 /home/user/name.OFfile, for example. For those not familiar with this command one can get more information about that by opening your favorite terminal and typing shred --help BUT those who are new to this should understand there is NO going back once you shred a file. Make sure the correct file is being shredded correctly and you don't end up shredding the wrong files or worse.
i am seeing fundamentals being left out, in many many areas of computing. if the system is found to be hacked then it should be declared a decomm and restored (rebuilt from a build doc). if there is no build doc then someone is not doing their job. running tools to "find" and "clean" on a prod system is ok to do in the lab, not ok to keep it in production.
^ i prefer trolls that actually bother to formulate proper replies.
Agree. LQ members posting questions in this forum require the attention and expertise of fellow members who actually care to offer friendly and constructive help.
@All: anyone offering any "advice" not catering to the OPs specific needs (like "use a VPN", period) or engaging in mindless banter will find me nudging you towards posting only in /General (cuz that's where the "quality" of your posts will appreciated "better" ;-p).
I've yet to come across any credible documentation stating that overwriting target data with 1 pass of zeros on modern hard drives (and SSDs excluding swap partitions) is anyhow "more vulnerable to data recovery" versus other methods, for all practical applications. If you find any such documentation, let me know.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.