Debian :: How To Securely Erase HD

Feb 18, 2011

I have a Debian Squeeze installed on my old iBook G4 mid 2005. The computer has been giving me hard time and I want to sell it for parts. Before that however I'd like to erase the hard drive securely. Is there a software that this forum recommends for erasing hard drives completely and securely? Is there Linux equivalent for something like DBAN which can be installed on a CD and then boot the computer from it?

View 14 Replies


ADVERTISEMENT

Ubuntu :: Use Swat Securely From A Securely Location?

Aug 6, 2010

How can you use swat securely from a securely location?

View 1 Replies View Related

General :: Patch Redhat And Debian Securely?

Jan 25, 2011

How to patch redhat and debian securely ? I mean is there sth like in solaris live upgrade, when after upgrade sth goes wrong I can revert to previous state from before upgrade?

View 4 Replies View Related

General :: How To Erase Everything And Start Debian Again

Jan 15, 2011

I need to restart my harddrive and reinstall debian.

View 8 Replies View Related

Debian Configuration :: Erase Memory At Shutdown

Jul 10, 2010

Without being paranoiac, it seems possible to keep the memory content for some minutes after shutdown and dump it accessing directly to the hardware.So how to fill the memory with constant or random pattern before halting? Is there a kernel option that I can give at boot time , or an other tool I can install from Debian/Ubuntu to achieve this ?

View 14 Replies View Related

Security :: Backup Securely With Rsync?

Jul 11, 2010

To copy from production to standby over the internet I use a cron job doing rsync -avze 'ssh -p 8022' --exclude-from= ....

My question is: should the cron job run on the production or the standby system. Root access to the remote system is given by a pass phrase-less ssh key. Currently I run rsync on the production system. I guess that it is more secure because the standby needs no ssh login to production. Running rsync on the standby would use less resources on production. I am concerned that in this case there would be pass phrase-less access from standby to production.

View 3 Replies View Related

Slackware :: Securely Browsing The Net � Using SOCKS?

Jan 30, 2011

I read this article:[URL]..(Alien for all packages and howto) but I have some doubts. Let's see if I understand correctly. In practice, we open a port (8888 for example) on the local PC on which you made a ssh tunnel to our server, right? Who resolves the dns? Our remote server? With this technique we are safe even from sending data through unencrypted protocols like hhtp (not https)? An administrator who wants to see what we visited what would see in his log?

View 2 Replies View Related

Fedora Networking :: NetworkManager Won't Connect Securely Under F10?

Feb 3, 2009

I loaded F10 up on my laptop a few nights back. NetworkManager connects via Ethernet just fine. It will also connect wirelessly, but only when security is disabled. I've been using 128-bit WEP.

When I try to connect using security, this is what appears in the log:

Code:
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 1 of 5 (Device Prepare) complete.
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 2 of 5 (Device Configure) starting...

[Code]......

View 2 Replies View Related

General :: How To Send A Large File Securely

Aug 28, 2011

I need to send large files from a Linux machine to another using cryptography. The sender machine knows the recipient IP but not vice-versa. I don't need strong cryptography and prefer higher-speed less-secure solutions.

There are no problems with presharing crypto keys but I'd prefer not dealing with SSH users creation.

I think to HTTP PUT over TLS, but I never had experience with it and I prefer to hear which are the possible solutions. I know that it can listen as a daemon but I don't know anything about cryptography. So pipeing with OpenSSL may be a solution.

View 2 Replies View Related

Slackware :: Securely Start Non-root Services?

Jun 19, 2011

I run Slackware 13.1 on a small Pentium 4 box that runs a torrent client, game server, and a few more Internet-related scripts.

I see no point running these stuff with root priviledges, so I have this line in rc.local:

Code:
su user -c "/home/user/services/start-all.sh"

How secure is that command, su user -c? And what would be the right way to go with it?

View 8 Replies View Related

Ubuntu Security :: How To Setup Web-facing Ssh Server Securely

Oct 18, 2010

I have a small network at my office (3 workstations, 1 ubuntu desktop that I'm using as a file server). I'm using a WRT54G2 router for networking and internet connectivity. Here's what I'm trying to accomplish: I want to be able to access my little file server from home, across town. I think ssh might be the best way to go now. What I don't know: How do I set up the ssh server on my machine/network without compromising my network security and the security of my server? Do I just set up port/ip forwarding on my router, install openssh, and that's it?

View 9 Replies View Related

Ubuntu Servers :: Securely Route All Traffic On The Client?

Mar 22, 2011

I am running Ubuntu Server 10.10. I have installed OpenVPN using this guide I have set up everything correctly as this guide says, but I am having problems with the config file. I want to securely route all traffic on the client to the server, how ever the server will not start. My config is below:

Quote:

#################################################
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #

[Code]......

The servers ip is 10.0.0.65 and I want to assign the clients the ip range of 10.0.0.200 to 10.0.0.20 When I try to start the server I get the message Fail.

View 8 Replies View Related

Networking :: Transparently And Securely Identifying Clients On A Network?

Dec 12, 2009

following on from [URL] I was having a little think about how to make this concept more secure. its easy enough to separate known and unknown clients out via MAC address. but that system is easier to break than it is to set up either, sniff out a mac address already connected to the system, and spoof that address.or, more simply, set a static IP on your wifi device, and avoid the redirection completely. so, is anyone aware of a relatively straight forward setup that would allow me to identify clients on my network without relying on MAC address, would more forcefully separate out known and unknown hosts (vlan??). As well as doing so without alerting them to the fact, and without requiring known hosts to do anything special, or install software. Or requiring any more hardware than I have already. (hardware = a debian box with 2 NIC's acting as a gateway between all internal network, and the billion router which handles the outside world not getting in, and a WAP attached to the internal side of the network. also somewhere I have a wifi card that I could attach to the server to replace the AP) I assume some sort of authentication mechanism is required, but I dont know much more past that.

View 2 Replies View Related

Security :: Running Services Securely - Chroot And Virtualization?

May 26, 2011

I'd like to run a Tor relay, but am trying to understand the security implications. For some time I've run my torrent client in a VirtualBox virtual machine, which is run as a very non-prived user, bridges directly to The Internets, and writes to one directory on the host. My belief is this is about as secure as it can be, but am open to suggestion.If I run a relay in the VM it wouldn't be associated with my use of Tor as a client, which is fine since there is no technical need for them to be connected and it's desirable for security.I read that chroot jails can be broken, particularly when run as root, so I don't really trust that. Also studied a vserver, but it must share the network setup which doesn't strike me as isolated enough.

View 14 Replies View Related

General :: Mount A Windows File Share Securely (encrypted)?

Jan 15, 2009

I'd like to find a way to mount a windows file share securely (encrypted) as I'll be communicating over the Internet.

View 4 Replies View Related

General :: Ssh - Forward A Program Window From Laptop To Desktop Securely?

Jul 30, 2010

Can't I forward a program window from my laptop to my desktop securely, both running Linux?How to ssh -X an existing window program just like the 'screen' program does?This question came up with my friends when watching an episode of 24! "Almeida send me your screen"

View 1 Replies View Related

Ubuntu Security :: Securely Delete File In TrueCrypt Volume

Jan 4, 2011

This one being Ubuntu 9.10 (yes, I know I really should upgrade). I keep a number of confidential files in a TrueCrypt container which is a standalone file in my Documents folder. I'd like to delete some of these, but I want to do it as securely as I can, but I believe if I simply hit 'Delete' with the file selected it'll move the file to the Deleted Items folder. This, I assume, means that the file is taken out of the encrypted volume and stored unencrypted in the Deleted folder.

I've been reading a little about the Shred command, and there seems to be some question about whether it works effectively with a journalled file system; and since I have no idea whether I'm using a journalled file system, or how to find out, I'm treating Shred and other over-writing secure deletion tools as ineffective for now.

With this in mind, can anyone advise me how I can protect the file stored in the TrueCrypt volume, and delete it in place, without taking it out of the encrypted area? And, further to that, can anyone tell me whether in fact the file is actually secured while it's in the encrypted volume? For all I know, just opening the volume may result in copies being made somewhere (apart from RAM).

View 5 Replies View Related

Ubuntu Security :: Transferring Sensitive Data Quickly And Securely?

Jun 27, 2011

My company needs to send sensitive data across to another company, 800gb of .dpx. The way I have thought of is:
E-Sata/1TB WD black.
True-encrypted/ hw accelerated aes (3x machines being built with 2600k)
Sha1sum on each file.

The main goal is to make sure that
1. The files that were transferred off the server onto the drive, are exactly the same.
2. Secure.
3. Fast.

View 9 Replies View Related

Programming :: Copy A File Securely To Remote Host In JAVA?

Feb 2, 2009

I am looking for an API in JAVA which gives me functionality to copy a file to remote host in secure manner like (SCP).

View 1 Replies View Related

Fedora :: Yum Erase Juk Does Not Work

May 15, 2011

i want to remove some of my app such as dragon, juk all of them are installed on my computer at installation of fedora ,now i want to erase them how i can do it?i tempted to remove them by this commands:
yum erase juk
yum remove juk
rpm -e juk
but none of them works and messages cannot find juk or dragon.

View 6 Replies View Related

General :: Erase All Of Vista

Jan 14, 2010

I have recently installed ubuntu on a previously vista operated laptop, now i need to eradicate all of vista i care not for it at all, I've read some of the threads here and saw someone say something about ubuntu overwriting everything on my hard drive including vista, is that dangerous, easy, and the most efficient way of doing this. i also tried removing the partition of vista by following a response to a thread, using gparted but now im stuck and i failed horribly (very limited computer knowledge).

View 11 Replies View Related

Fedora :: Difference Between 'yum Remove' And 'yum Erase'?

Jan 27, 2010

ABRT 'sucks' Will my system die if I remove abrt* will this work:

Code:
yum remove abrt*

and what is the difference between 'yum remove' and 'yum erase' ?

View 7 Replies View Related

General :: Secure Erase Of CF Card Over USB?

Aug 9, 2011

I have a CF card I'd like to erase. My CF card reader is connected to my Linux machine via USB. How do I do a secure erase (i.e., the ATA Secure Erase functionality) of the CF card?

I have tried hdparm --security-erase NULL /dev/sdc, but I get an error: ERASE_PREPARE: Invalid exchange. In fact, any hdparm command gives me the same error:

# hdparm -I /dev/sdc
/dev/sdc:
HDIO_DRIVE_CMD(identify) failed: Invalid exchange

I read somewhere that hdparm can't do an ATA Secure Erase of a drive that is connected over USB. Is this true? I tried using sdparm, but sdparm doesn't seem to have the capability to send the ATA Secure Erase command to the CF card. So, what is the proper way to do this?

View 1 Replies View Related

Ubuntu :: Erase Profile At Logoff

Aug 3, 2010

I work for a public school and we are implementing a number of Ubuntu NBR 9.1 netbooks. I wanted to use Likewise Active Directory for authentication, but have problems with the software so now I'm onto another solution for our problem.
We are going to have one login for all users (Students, is the name). The problem with this is that Website passwords can inadvertantly be stored, potentially compromising users personal data. Additionally, I don't want to have any files left in the Students profile in case people accidentally save personal information in their files.I'm thinking there are potentially two solutions:

1. The Students profile is deleted when the user logs off. This will erase web history and files

2. The Students account is always logged in with a temporary profile (or no profile, if that is possible) that deletes itself at logoff because it is temporary.

I'm having a hard time coming up with search terms for a solution like this, so I thought I would put the question to the experts.

View 1 Replies View Related

Ubuntu :: How To Erase And Reinstall Grub

Oct 11, 2010

Several moths ago I installed Ubuntu 10.10 Maverick Meerkat alfa3 in a newly created partition while I was using Ubuntu 10.04 Lucid Lynx. After I installed the 10.10 alfa3, I realized that it also installed its grub. Moreover that grub could not detect the kernel updates of 10.04. Thus, I recovered the grub of 10.04 via live CD. Interestingly after I returned the grub of 10.04 the boot time of 10.04 has considerably increased.

For example, the Ubuntu splash screen appears 20 seconds after selecting Ubuntu in Grub menu. I thought that a fresh installation for 10.10 final release would solve the problem but it seems that I'm still getting the same boot time until the splash screen is the same. It seems that I need a fresh installation of Grub. The methods that are introduced following url are just recovers Grub. I need to erase and reinstall the Grub. [URL]

View 2 Replies View Related

Ubuntu :: Get Rid Off Some Files That Don't Wanna Erase Themselves?

Jan 27, 2011

that's my problem, can't find a way to erase 2 files that apparently don't want to move to the rubish bin. it says: can't move the file to trash, wan't to erase it permanently? I click on erase and the thing still there! could you please get me some commands? and by the way, how do I find how to use the command line so I don't bother you all the time? would it take me a hole engineering carrer or something? any 'document' recommended?

View 9 Replies View Related

Ubuntu :: Erase It And Reinstall Windows Xp

May 2, 2011

job installing windows XP and a partion ubuntu (?) on my desktop compooper. telling him i have no knowledge of ubuntu, he still isntalled it. I am giving this computer to my parents, and want to just put Windows XP on it. here is what a half *** job means, windows XP doesn't have the sound and ethernet driver. he couldn't find them to install them onto the computer...and i keep getting errors all over the place when i try and do things on ubuntu.

I downloaded Windows XP Professional 64bit Corporate yesterday and burned it to a CD. Restarted the computer so it will boot but it just keeps going to the screen asking which system I want to log in to. NOW HERE IS THE KICKER.... when i try to go onto the windows XP side, it is coming up with an error that says I need to activate windows. when i click yes, it says i have already activated. when i click on the user it repeats what i just stated. so now i can't even get into the windows xp side.

View 5 Replies View Related

Ubuntu :: Can't Erase Synergy.conf

May 8, 2011

I'm having a problem trying to uninstall Quicksynergy all the way.first i did sudo apt-get remove synergy then sudo apt-get purge synergy.Checked in synaptic manager and software center that they did not show it. reinstalled synergy through the software center. and it is still showing me the name/ ip of my client.so this tells me it did not uninstall everything. i have searched the file system for synergy.conf with no luck been high and low on the web but no luck.

View 2 Replies View Related

Ubuntu :: Way To Erase Hard Drive

Jun 18, 2011

I got 8.10 to load and run on my set up, got disc burned ready for fresh install but won't boot from disc? erasing the drive is no issue so no problem there, i at least have a taste for this now and are liking it.is there a way to erase the hard drive, to get the disc to boot so i can install a supported version? i have kubuntu 11.04 ready to go.from playing on this kde version am really impressed and like this.smokes windows all to pieces, though i like my games for window too

View 8 Replies View Related

Hardware :: How To Erase Data Completely On HD

Sep 2, 2010

What will be an easy and reliable way to completely erase a hard drive excluding with a hammer.I have several 40G IDE Hard drives, running Linux or Windows, for disposal. A friend of mine needs them. I want completely erase all data before delivering them to him. Googling "How to completely erase a hard drive" brought me many suggestion.

View 9 Replies View Related







Copyrights 2005-15 www.BigResource.com, All rights reserved