learn linux and unix commands - unix shell scripting

Secure data erasure

 
Thread Tools Search this Thread
# 1  
Old 03-20-2009
Secure data erasure

For all the trouble we have to take to protect, backup, and maintain our data, when we want to get rid of it, it turns out to be remarkably difficult.  Do we delete  Overwriting delete?  Overwrite 40 times?  Overwrite 40 times including all the slack space?  Degauss?  Get out the thermite?

This site presents a faster and easier option.  There is software, and also a paper (possibly self-serving ...) explaining the option, and why it is very often good enough.

Image
Image

More...
Login or Register to Ask a Question

Previous Thread | Next Thread

9 More Discussions You Might Find Interesting

1. Infrastructure Monitoring

How secure using Nagios?

Hello Experts, I have my windows servers located at different data-centers across US and I am monitoring all of them using Nagios server configured on a CentOS. All communications are done via public IP address and I doubt it can invite some security threats too. Can anyone let me know if it is... (3 Replies)
Discussion started by: naw_deepak
3 Replies

2. Cybersecurity

How can i secure my personal data and E-mail id?

Today the problem of hacking is increasing day by day so in this situation how can i secure my personal data and E-mail id? Please reply me soon. (1 Reply)
Discussion started by: andrepitt77
1 Replies

3. UNIX for Advanced & Expert Users

Which is the most secure *nix?

Which is the most secure *nix for home business/ office use? Would have to be fairly well up to date browser and drivers wise. Myself I seem to have settled on RedHat - I've trialled the Desktop, and am part-way through a server trial. I've essentially not managed to keep the browser as secure... (2 Replies)
Discussion started by: GSO
2 Replies

4. Shell Programming and Scripting

Extract data based on match against one column data from a long list data

My input file: data_5 Ali 422 2.00E-45 102/253 140/253 24 data_3 Abu 202 60.00E-45 12/23 140/23 28 data_1 Ahmad 256 7.00E-45 120/235 140/235 22 data_4 Aman 365 8.00E-45 15/65 140/65 20 data_10 Jones 869 9.00E-45 65/253 140/253 18... (12 Replies)
Discussion started by: patrick87
12 Replies

5. IP Networking

Secure Network

OK Guys I need help. I have a very small network (lets say x.y.z.0 - x.y.z.255). Now I do not have any control over the router. But I am in control of the switch that splits the network from one single physical line (wire). I have a bridge fire wall between the line and the switch that filters out... (1 Reply)
Discussion started by: disturbe_d
1 Replies

6. Solaris

Secure FTP Problem using Sun SSH on Client system F-Secure on Server system

I am using shell script to do secure ftp. I have done key file setup to do password less authentication. Following are the FTP Details: FTP Client has Sun SSH. FTP Server has F-Secure. I am using SCP Command to do secure copy files. When I am doing this, I am getting the foll error scp:... (2 Replies)
Discussion started by: ftpguy
2 Replies

7. Solaris

Secure Rmount

We run Solaris 8 and now Solaris 10. I would like to create a secure share on my rman server that I could put backups directly on the rman server. They will then get backed up to tape. Does anyone have any suggestions on how I can do this? Thanks. (0 Replies)
Discussion started by: gandolf989
0 Replies

8. HP-UX

Using Secure Path

I am fairly new to HP-UX, so I am not very skilled yet. I am trying to make use of Secure Path. The only documentation I have found on the HP web site shows me how to install it and release notes. I have not found any information on how to actually use it for the SAN storage I have presented. ... (2 Replies)
Discussion started by: KEnglander
2 Replies

9. Filesystems, Disks and Memory

System crash and Disk erasure !!!

I need some expert help, and would appreciate any feedback on the following problem: After power outage the machine didn't allow the login. When we checked it , it looked like both disks were completely empty. Luckily, we have a backup machine, and we can restore the disks. Has anybody seen... (3 Replies)
Discussion started by: DGoubine
3 Replies
Login or Register to Ask a Question
XSaveContext(3X11)						  XLIB FUNCTIONS						XSaveContext(3X11)

NAME
XSaveContext, XFindContext, XDeleteContext, XUniqueContext - associative look-up routines SYNTAX
int XSaveContext(display, rid, context, data) Display *display; XID rid; XContext context; XPointer data; int XFindContext(display, rid, context, data_return) Display *display; XID rid; XContext context; XPointer *data_return; int XDeleteContext(display, rid, context) Display *display; XID rid; XContext context; XContext XUniqueContext() ARGUMENTS
context Specifies the context type to which the data belongs. data Specifies the data to be associated with the window and type. data_return Returns the data. display Specifies the connection to the X server. rid Specifies the resource ID with which the data is associated. DESCRIPTION
If an entry with the specified resource ID and type already exists, XSaveContext overrides it with the specified context. The XSaveContext function returns a nonzero error code if an error has occurred and zero otherwise. Possible errors are XCNOMEM (out of memory). Because it is a return value, the data is a pointer. The XFindContext function returns a nonzero error code if an error has occurred and zero otherwise. Possible errors are XCNOENT (context-not-found). The XDeleteContext function deletes the entry for the given resource ID and type from the data structure. This function returns the same error codes that XFindContext returns if called with the same arguments. XDeleteContext does not free the data whose address was saved. The XUniqueContext function creates a unique context type that may be used in subsequent calls to XSaveContext. SEE ALSO
Xlib - C Language X Interface X Version 11 Release 6.6 XSaveContext(3X11)