Please Scroll Down to See Forums Below
napsgear
genezapharmateuticals
domestic-supply
puritysourcelabs
UGL OZ
UGFREAK
napsgeargenezapharmateuticals domestic-supplypuritysourcelabsUGL OZUGFREAK

Computer security questions

OK, hold on. This is what I do for a living. There are many tools that will wipe a drive. The semi-current DOD standard is 14 time, that is the drive must be written with a random pattern 14 times.

As for recovered drive data as evidence, it can hold up easy - it all depends how convincing you are as a expert witness and how good the lawyers are.

Go with the crypto option, and the wipe option. Also the mag. field is mostly bullshit anymore. The field required to achive the same results as the 14 pass wipe would actually have to be strong enough to bend the media.
 
the best thing that you could do is rig small amounts of explosives in ur computer /w a wireless detonator that's connected to ur watch.. when u see a suspicious stranger approaching u.. u need to blow that sucka up!!! THAT'S THE FOR SURE WAY!!!!!!! I would like to see them get around that.. muahaha
 
A more feasible way would be to write a script or batch file that would execute an fdisk command that would surely wipe out your partition.. from my knowledge I don't think that they will be able to get to ur files... and also make sure that u've created a drive image onto a cd(don't keep this in ur house!) that would restore everything when the coast is clear..

PM me for further instructions....
 
fdisk is recoverable. besides whenever I do forensic work on a PC the tools I use connect via null modem cable. The host OS, partitions, filesystems don't matter to me at all. I would look for data all over the drive.
 
mvmaxx said:


Sorry but this is an incorrect statement.
The software programs quoted will permanently delete selected data. It has been proven in a case with EE.

Not trying to be a dick but your completely and utterly wrong.

I would never trust Evidence Eliminator. 1, it's closed source. 2, they purposely distribute crippled versions to cut down on piracy. How are you to know if the software is working exactly as advertised?

Voodoo, is correct. You have to consider who your trying to hide the information from. I question whether it's even possible to have a usuable system that information cannot be recovered from given the right amount of resources. If your just worried about a local police raid, I'd use one of the many programs which will completely wipe the disk with alternating bit patterns. They'd have to be pretty damn determined to get anything after that.
 
Here you go...

Fdisk the drive then wipe out both primary and secondary (or all) partitions.
Reboot to a bootable floppy.
Format the drive
Fdisk the system again getting rid of all partitions.
Last step.... use a rubber headed hammer and hit the drive. It won't look as bad as a regular hammer and the platters inside will crash. The spindle will no longer work and even if the gov. (NSA) used their tech. to rebuild your drive with new spindles and sinner heads, the drive was fdisk'ed twice and will have no partions to recover data from let alone a file filler that allows low level recovery from a formatted drive.

Good luck...
PS. The best tool I ever used was Triple Eraser Software. It can erase a drive up to 12 times. NSA uses this and so do big forture 200 firms.

Aikido:D
 
OK, my bad the current DOD standard is not 14, its 26. You may want to check out this tool (free)

http://www.sysinternals.com/ntw2k/source/sdelete.shtml

It will also go over slack or blank space.

Also, not to be a pain again but fdisk wont do shit. It deletes pointers to the partition(s). This is on the MBR for primary partitions. Extended partitions information is "extended" to the end of the primary(s). Fdisk will never touch the file system and if you now the drive specs you can recreate the info with a disk editor. Again there is no point in doing that, as forensic software will function with or without it.
 
Top Bottom