June 4th, 2008, 09:32 AM
I am afraid that is a widely held misconception.
I'm assuming that since you say you worked for the military that you obviously had a legitimate IT department and things such as network storage devices and monetary resources that could be put toward useful devices.
Actually, I worked for an arms manufacturer but my military colleagues had more or less the same story. For us, if something was not a requirement of the projects (stuff we could bill customers for) it was at the bottom of the food chain. For the military if it was not to improve "fighting efficiency" it was more or less the same. So that meant no spare servers and no spare decent computers.
Cipher would have been out of the question anyway........ they were still running NT 4.0 SP6a
Actually no. The software took a few seconds to burn to a floppy disk, so making 20 didn't take long. All you had to do was insert the floppy and turn the machine on and it would boot to it. You got a "do you really want to do this?" and gave it a "Y" then moved on to the next machine.
If you compare rebooting every machine with a special disc that you have to interact with to removing the hard drive and sticking it in a hot-swappable storage device, I think it would be faster to remove the hard drive. You wouldn't really be doing 20 at once, if you had to sit down at each machine in order to interact with the program that wipes it.
These were old PI boxes so no sata drives.
Maybe I read too much into the question. When he asked about a low level format to DoD standards I took it to mean that he wanted to securely overwrite the whole drive.
With all of this said, however, we still have to go back to the original question. He really just wanted to hear examples of software packages that could be used to make data unrecoverable.
Exactly, but that is all the manufacturers formatting tools will do. Like I said if it is just a repair job that is what I use.
The one pass you mentioned that you do earlier would hardly be considered military-level security.
Index.dat Analyzer is the free product I was suggesting you look at. It shows you some of the stuff Windows has left on your drive.
eNcase is the flagship forensics data gathering tool. It is used by police departments and accepted in courts throughout the World.
Nope, that is actually a typical set-up for a secure environment. Normally the user wouldn't even be able to directly access the local HDD, they have to work on servers, so there is no need for anything other than one drive and one partition.
Your computer only has one hard drive? Are you living in the stone ages?
Not a problem I would have thought. The software will fit on a 3.5" floppy. I only said CD/DVD because modern machines generally don't have a floppy drive.
I guess you didn't factor in getting the CD or even having to create the CD... silly...
I don't see the relevance of that. Sure you can turn off pagefile.sys What you cannot turn off is the fact that XP, 2000 and Vista are virtual memory systems. They will use it and there is nothing you can do to prevent this, they will just make their own arrangements "behind your back".
Errr I didn't say use regedit, however editing the Registry is what you actually do, however you decide to do it.
You do realize that you can just click the radio button, right, rather than telling everyone to edit their registry?
In fact, in a secure environment this setting should be part of the standard build, and users should have no access to the Registry.
Yes and Yes. Not everyone has rocket science machines particularly in commercial and institutional environments. Overwriting large files and folders can take a while and is best done in dedicated mode. Please note that I did say:
Do you honestly sit there and wait for the machine to finish, or do you use another machine?
..... in particular when you are wiping a whole disk.
Not a fantasy World, a secure World. The concept of least empowerment, and the users can only do what they absolutely need to be able to do. You have an image of the installation and if anything goes wrong you just re-image it.
I guess you're living in a fantasy world where you can only have a system drive on your computer and that drive is one big system partition...
Of course I am making the assumption that if you are interested in secure wiping you must be dealing with a system that handles sensitive data? In which case this would be the architecture I would expect to see.
Last edited by nihil; June 4th, 2008 at 09:36 AM.
If you cannot do someone any good: don't do them any harm....
As long as you did this to one of these, the least of my little ones............you did it unto Me.
What profiteth a man if he gains the entire World at the expense of his immortal soul?
By cheyenne1212 in forum Miscellaneous Security Discussions
Last Post: February 1st, 2012, 02:51 PM
By helloworid in forum Newbie Security Questions
Last Post: April 30th, 2004, 09:27 PM
By Death_Knight in forum Hardware
Last Post: January 2nd, 2004, 04:00 AM
By hexadecimal in forum AntiOnline's General Chit Chat
Last Post: June 14th, 2003, 08:51 PM
By Badassatchu in forum Non-Security Archives
Last Post: November 23rd, 2001, 11:13 PM