Search Results - Antionline Forums - Maximum Security for a Connected World

Search:

Type: Posts; User: kythe; Keyword(s):

Page 1 of 2 1 2

Search: Search took 0.01 seconds.

  1. Replies
    9
    Views
    2,768

    A seven-year-old harddrive is pretty old (and...

    A seven-year-old harddrive is pretty old (and probably noisy, too, compared with today's drives!), assuming the computer has been used regularly. If she has any data to salvage, I'd boot from a...
  2. I saw that too, and thought "ATAPI" usually meant...

    I saw that too, and thought "ATAPI" usually meant CD-ROM :)

    The Hitachi drives generally have an excellent reputation, but even they go out after a while. The good news is that they're not...
  3. I think Nihil had it right: we crossed...

    I think Nihil had it right: we crossed definitions of "deleted" with "overwriting". A quick format, indeed, leaves the data itself intact and it can be recovered. My apologies for jumping all over...
  4. I agree, it's important to keep definitions in...

    I agree, it's important to keep definitions in mind when talking about this topic.

    Deleted data and other stray data on hard drives is recovered all the time -- this is one of the ways computer...
  5. This simply isn't true. As Nihil noted, if it...

    This simply isn't true. As Nihil noted, if it were true, disks would produce errors all the time, as they'd not be able to tell what data is current and which is old.

    The normal hard drive...
  6. All true. It's also true that, though Gutmann...

    All true. It's also true that, though Gutmann described theoretical methods of recovering overwritten data, to date no one has actually demonstrated the practical ability to do so. There are no...
  7. Very true. And for the most part, even if...

    Very true. And for the most part, even if overwritten data can be recovered, it's not likely that anyone will face that sort of thing. There are probably other, less expensive ways to get the data...
  8. Theoretically, it's possible. But again, when...

    Theoretically, it's possible. But again, when researchers have actually tried to do it, the signal is buried in the noise--more sensitivity doesn't help.

    Usually, what's done is to attach the raw...
  9. There are lots of considerations. The bottom...

    There are lots of considerations. The bottom line, though, is that data overwritten is pretty much unrecoverable by ANY means, episodes of "NCIS" notwithstanding.

    The trick is to actually...
  10. That isn't quite true. While only Windows XP and...

    That isn't quite true. While only Windows XP and Server 2003 by default associate handlers with WMF files, in older systems (e.g. Windows 2000) applications may have easily associated WMF files with...
  11. Thread: P2P Hoo-Haa

    by kythe
    Replies
    15
    Views
    1,394

    What's wrong with downloading or sharing...

    What's wrong with downloading or sharing copyrighted material? As long as the copyright holder has given people permission to do so (e.g. Linux, and an increasing number of music artists) then...
  12. Replies
    44
    Views
    2,973

    Catch, I wrote: To which you responded, ...

    Catch,
    I wrote:


    To which you responded,



    Your current objection is a distinction without a difference: all such labels are, by definition, "relative", as they must be compared with other...
  13. Replies
    44
    Views
    2,973

    I agree completely, and if you're bothering to...

    I agree completely, and if you're bothering to format the drive, I see no reason why you can't spend an extra hour and overwrite the drive at least once.



    I think it depends upon just how much...
  14. Replies
    44
    Views
    2,973

    And fortunately, I don't require you to care in...

    And fortunately, I don't require you to care in order to state my opinion. Ah, the beauty of the unbridled Internet :)



    The process isn't "high assurance", any more than locking your card door...
  15. Replies
    44
    Views
    2,973

    Umm..."easy" being a relative term here. As in...

    Umm..."easy" being a relative term here. As in "spending tens of thousands of dollars and tasking tens-to-hundreds of thousands of dollars of equipment and a technician or two for several months on...
  16. Replies
    44
    Views
    2,973

    There is no application which can read data that...

    There is no application which can read data that the hard drive can no longer sense--this is an impossibility. You have to physically remove the drive platters and subject them to magnetic force...
  17. Replies
    44
    Views
    2,973

    While this is true, it's also true that three...

    While this is true, it's also true that three overwrite passes is sufficient to deal with Secret-level data destruction, according to DoD specs, and that's not small potatoes, either.

    The bottom...
  18. Replies
    44
    Views
    2,973

    I also recommend DBAN, as someone who's used it...

    I also recommend DBAN, as someone who's used it and subsequently verified that the wipe was complete.

    The one drawback to DBAN, as I understand it, is that it can't yet deal with Host Protected...
  19. Replies
    38
    Views
    3,707

    Ah, but you do have some control -- at least, as...

    Ah, but you do have some control -- at least, as far as the destination is concerned. The sites you visit are your choice. Just because someone puts up a publicly-accessible web server on TCP port...
  20. Replies
    38
    Views
    3,707

    Unfortunately, things aren't that simple. Do you...

    Unfortunately, things aren't that simple. Do you have any idea how many networks you're going through to post on Antionline? How about the other web sites or Internet resources you visit every day?...
  21. Replies
    38
    Views
    3,707

    Well, here's the problem: the law, if it forbids...

    Well, here's the problem: the law, if it forbids this type of activity, is pretty confused.

    Not only did the network likely advertise its presence and services (via SSID broadcast), and not only...
  22. Replies
    12
    Views
    1,369

    Yep. Of course, Secunia.com lists two "highly...

    Yep. Of course, Secunia.com lists two "highly critical" vulnerabilities in IE that have gone unpatched for a long time (one over two years)...

    http://secunia.com/product/11/#advisories
  23. Replies
    16
    Views
    2,524

    On the topic of encryption, a program I've been...

    On the topic of encryption, a program I've been experimenting with is Truecrypt 3.1a (also open source). It incorporates basically unbreakable on-the-fly encryption in several ways, has quite a few...
  24. Replies
    16
    Views
    2,524

    Hi, Andrew, I've confirmed, using...

    Hi, Andrew,
    I've confirmed, using before-and-after direct disk view software, that at least one program does indeed wipe data: Eraser 5.7 (open source software). That includes wiping small files...
  25. Replies
    29
    Views
    2,011

    It should be noted that, at least according to...

    It should be noted that, at least according to the article, there was no evidence presented that any files were encrypted or evidence destroyed using the encryption program (PGP). It would seem that...
Results 1 to 25 of 30
Page 1 of 2 1 2

 Security News

     Patches

       Security Trends

         How-To

           Buying Guides