Sponsored Content
Full Discussion: Wipe tool for HP-UX
Operating Systems HP-UX Wipe tool for HP-UX Post 302901647 by cjcox on Wednesday 14th of May 2014 05:01:12 PM
Old 05-14-2014
I would think you could take input from the random pool (is it /dev/urandom on HP-UX?) and dd write it over the block device for the filesystem... do it a few times if paranoid possibly with an intervening /dev/zero wipe. I've been away from HP-UX for a while though... somebody may have a better answer.
 

10 More Discussions You Might Find Interesting

1. Solaris

What do you use to wipe your disks?

What are y'all using to wipe your solaris disks? I am being question by IT Security, what I am using to wipe disk. Is anyone using a 3rd party utility? I have used the format utility in solaris previously. But they are looking for something commercial that I can use. Anyone have... (4 Replies)
Discussion started by: BG_JrAdmin
4 Replies

2. UNIX for Advanced & Expert Users

can hanging perl process wipe out a directory?

Hi, This weekend i left a perl script running , I was running it in a remote machine. The machine seems to have been rebooted during the weekend. When i got back on monday the entire directory containing the script was wiped out. The process had been aborted. Nobody has access to the directory... (2 Replies)
Discussion started by: aboxilica
2 Replies

3. What is on Your Mind?

Nuclear Elephant iPhone Wipe making your iPhone Safer for Resale

For those with the iPhones here might read up how to wipe your personal data off the phone before reselling or trade-in. ;) source: Nuclear Elephant: iPhone Wipe June 1, 2008: Making your iPhone Safe for Resale Since my posts regarding the iPhone restore mode being insufficient for wiping... (0 Replies)
Discussion started by: sparcguy
0 Replies

4. UNIX for Dummies Questions & Answers

Reommendations for hp-ux wipe software

I am looking for software to do DoD compiliant wipes on Hp-Ux. Thank you in advance for any recommendations provided. (1 Reply)
Discussion started by: jim15800
1 Replies

5. UNIX for Advanced & Expert Users

Wipe software for Hp-ux

I am looking for recommendations on DOD compliante software to wipe disk on HP-UX. Any recommendations would be appreciated. Thank you in advance for any assistance provided. (1 Reply)
Discussion started by: jim15800
1 Replies

6. Solaris

Wipe a Sunfire V480

Hi Guys I'm new here in these forums and also in Sun Solaris/Sun hardware related things. I have some really basic questions about the way to go for "wipe" a Sun Solaris system. I have to sell a used Sunfire v480 and I wan't to wipe the old sytem before selling it. But I'm not sure if I... (6 Replies)
Discussion started by: slowatsch
6 Replies

7. Cybersecurity

How do I wipe stdout?

Today I used Terminal (invoked from Mac OS X 10.4.11) to view some data that is secured by a password. After exiting Terminal, it occurred to me that a vestige of the data displayed on my screen might reside in memory or in disk file ... the actual file used for stdout, for example. Do I need... (1 Reply)
Discussion started by: dcollins
1 Replies

8. Solaris

Solaris box completely wipe

HI, I woluld like to know is it possible to boot solairs into single usermode from cd and using format -> purge command to wipe all the disk? please suggest or any other method ? my requirement is to completely wipe solaris box. (4 Replies)
Discussion started by: manoj.solaris
4 Replies

9. UNIX for Advanced & Expert Users

Server wipe tool for AIX and Linux

Hi Friends, I am looking for a opensource/inbuilt server wipe tools similar to DBAN for the server decommissions. I have several AIX and Linux machines to decom as part of datacenter shutdowns. But these 'DOESNT' have console access and I need to do the wipe remotely. Can you please suggest me... (9 Replies)
Discussion started by: shyam2j
9 Replies

10. BSD

Wipe out userland caches with shred, bleach bit is out of reach

Another topic that bothers me on bsd is the missing of bleach-bit. Looking at what bleach-bit can clean, the new version, it wipes out all the caches of the user. May someone can give me a hint how to clean the userland in bsd and all the hidden caches for the user. shred all rubbish or LSA cookies... (0 Replies)
Discussion started by: 1in10
0 Replies
random(7D)							      Devices								random(7D)

NAME
random, urandom - Strong random number generator device SYNOPSIS
/dev/random /dev/urandom DESCRIPTION
The /dev/random and /dev/urandom files are special files that are a source for random bytes generated by the kernel random number generator device. The /dev/random and /dev/urandom files are suitable for applications requiring high quality random numbers for cryptographic pur- poses. The generator device produces random numbers from data and devices available to the kernel and estimates the amount of randomness (or "entropy") collected from these sources. The entropy level determines the amount of high quality random numbers that are produced at a given time. Applications retrieve random bytes by reading /dev/random or /dev/urandom. The /dev/random interface returns random bytes only when suffi- cient amount of entropy has been collected. If there is no entropy to produce the requested number of bytes, /dev/random blocks until more entropy can be obtained. Non-blocking I/O mode can be used to disable the blocking behavior. The /dev/random interface also supports poll(2). Note that using poll(2) will not increase the speed at which random numbers can be read. Bytes retrieved from /dev/random provide the highest quality random numbers produced by the generator, and can be used to generate long term keys and other high value keying material. The /dev/urandom interface returns bytes regardless of the amount of entropy available. It does not block on a read request due to lack of entropy. While bytes produced by the /dev/urandom interface are of lower quality than bytes produced by /dev/random, they are nonetheless suitable for less demanding and shorter term cryptographic uses such as short term session keys, paddings, and challenge strings. Data can be written to /dev/random and /dev/urandom. Data written to either special file is added to the generator's internal state. Data that is difficult to predict by other users may contribute randomness to the generator state and help improve the quality of future gener- ated random numbers. /dev/random collects entropy from providers that are registered with the kernel-level cryptographic framework and implement random number generation routines. The cryptoadm(1M) utility allows an administrator to configure which providers will be used with /dev/random. ERRORS
EAGAIN O_NDELAY or O_NONBLOCK was set and no random bytes are available for reading from /dev/random. EINTR A signal was caught while reading and no data was transferred. ENOXIO open(2) request failed on /dev/random because no entropy provider is available. FILES
/dev/random /dev/urandom ATTRIBUTES
See attributes(5) for descriptions of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Availability | SUNWcsr | |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
cryptoadm(1M), open(2), poll(2), attributes(5) NOTES
/dev/random can be configured to use only the hardware-based providers registered with the kernel-level cryptographic framework by dis- abling the software-based provider using cryptoadm(1M). You can also use cryptoadm(1M) to obtain the name of the software-based provider. Because no entropy is available, disabling all randomness providers causes read(2) and poll(2) on /dev/random to block indefinitely and results in a warning message being logged and displayed on the system console. However, read(2) and poll(2) on /dev/urandom continue to work in this case. An implementation of the /dev/random and /dev/urandom kernel-based random number generator first appeared in Linux 1.3.30. A /dev/random interface for Solaris first appeared as part of the CryptoRand implementation. SunOS 5.11 1 Sep 2008 random(7D)
All times are GMT -4. The time now is 01:11 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy