Debian :: How To Securely Erase HD
Feb 18, 2011
I have a Debian Squeeze installed on my old iBook G4 mid 2005. The computer has been giving me hard time and I want to sell it for parts. Before that however I'd like to erase the hard drive securely. Is there a software that this forum recommends for erasing hard drives completely and securely? Is there Linux equivalent for something like DBAN which can be installed on a CD and then boot the computer from it?
View 14 Replies
ADVERTISEMENT
Aug 6, 2010
How can you use swat securely from a securely location?
View 1 Replies
View Related
Jan 25, 2011
How to patch redhat and debian securely ? I mean is there sth like in solaris live upgrade, when after upgrade sth goes wrong I can revert to previous state from before upgrade?
View 4 Replies
View Related
Jan 15, 2011
I need to restart my harddrive and reinstall debian.
View 8 Replies
View Related
Jul 10, 2010
Without being paranoiac, it seems possible to keep the memory content for some minutes after shutdown and dump it accessing directly to the hardware.So how to fill the memory with constant or random pattern before halting? Is there a kernel option that I can give at boot time , or an other tool I can install from Debian/Ubuntu to achieve this ?
View 14 Replies
View Related
Jul 11, 2010
To copy from production to standby over the internet I use a cron job doing rsync -avze 'ssh -p 8022' --exclude-from= ....
My question is: should the cron job run on the production or the standby system. Root access to the remote system is given by a pass phrase-less ssh key. Currently I run rsync on the production system. I guess that it is more secure because the standby needs no ssh login to production. Running rsync on the standby would use less resources on production. I am concerned that in this case there would be pass phrase-less access from standby to production.
View 3 Replies
View Related
Jan 30, 2011
I read this article:[URL]..(Alien for all packages and howto) but I have some doubts. Let's see if I understand correctly. In practice, we open a port (8888 for example) on the local PC on which you made a ssh tunnel to our server, right? Who resolves the dns? Our remote server? With this technique we are safe even from sending data through unencrypted protocols like hhtp (not https)? An administrator who wants to see what we visited what would see in his log?
View 2 Replies
View Related
Feb 3, 2009
I loaded F10 up on my laptop a few nights back. NetworkManager connects via Ethernet just fine. It will also connect wirelessly, but only when security is disabled. I've been using 128-bit WEP.
When I try to connect using security, this is what appears in the log:
Code:
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 1 of 5 (Device Prepare) complete.
Jan 29 21:07:17 localhost NetworkManager: <info> Activation (wlan0) Stage 2 of 5 (Device Configure) starting...
[Code]......
View 2 Replies
View Related
Aug 28, 2011
I need to send large files from a Linux machine to another using cryptography. The sender machine knows the recipient IP but not vice-versa. I don't need strong cryptography and prefer higher-speed less-secure solutions.
There are no problems with presharing crypto keys but I'd prefer not dealing with SSH users creation.
I think to HTTP PUT over TLS, but I never had experience with it and I prefer to hear which are the possible solutions. I know that it can listen as a daemon but I don't know anything about cryptography. So pipeing with OpenSSL may be a solution.
View 2 Replies
View Related
Jun 19, 2011
I run Slackware 13.1 on a small Pentium 4 box that runs a torrent client, game server, and a few more Internet-related scripts.
I see no point running these stuff with root priviledges, so I have this line in rc.local:
Code:
su user -c "/home/user/services/start-all.sh"
How secure is that command, su user -c? And what would be the right way to go with it?
View 8 Replies
View Related
Oct 18, 2010
I have a small network at my office (3 workstations, 1 ubuntu desktop that I'm using as a file server). I'm using a WRT54G2 router for networking and internet connectivity. Here's what I'm trying to accomplish: I want to be able to access my little file server from home, across town. I think ssh might be the best way to go now. What I don't know: How do I set up the ssh server on my machine/network without compromising my network security and the security of my server? Do I just set up port/ip forwarding on my router, install openssh, and that's it?
View 9 Replies
View Related
Mar 22, 2011
I am running Ubuntu Server 10.10. I have installed OpenVPN using this guide I have set up everything correctly as this guide says, but I am having problems with the config file. I want to securely route all traffic on the client to the server, how ever the server will not start. My config is below:
Quote:
#################################################
# Sample OpenVPN 2.0 config file for #
# multi-client server. #
# #
# This file is for the server side #
[Code]......
The servers ip is 10.0.0.65 and I want to assign the clients the ip range of 10.0.0.200 to 10.0.0.20 When I try to start the server I get the message Fail.
View 8 Replies
View Related
Dec 12, 2009
following on from [URL] I was having a little think about how to make this concept more secure. its easy enough to separate known and unknown clients out via MAC address. but that system is easier to break than it is to set up either, sniff out a mac address already connected to the system, and spoof that address.or, more simply, set a static IP on your wifi device, and avoid the redirection completely. so, is anyone aware of a relatively straight forward setup that would allow me to identify clients on my network without relying on MAC address, would more forcefully separate out known and unknown hosts (vlan??). As well as doing so without alerting them to the fact, and without requiring known hosts to do anything special, or install software. Or requiring any more hardware than I have already. (hardware = a debian box with 2 NIC's acting as a gateway between all internal network, and the billion router which handles the outside world not getting in, and a WAP attached to the internal side of the network. also somewhere I have a wifi card that I could attach to the server to replace the AP) I assume some sort of authentication mechanism is required, but I dont know much more past that.
View 2 Replies
View Related
May 26, 2011
I'd like to run a Tor relay, but am trying to understand the security implications. For some time I've run my torrent client in a VirtualBox virtual machine, which is run as a very non-prived user, bridges directly to The Internets, and writes to one directory on the host. My belief is this is about as secure as it can be, but am open to suggestion.If I run a relay in the VM it wouldn't be associated with my use of Tor as a client, which is fine since there is no technical need for them to be connected and it's desirable for security.I read that chroot jails can be broken, particularly when run as root, so I don't really trust that. Also studied a vserver, but it must share the network setup which doesn't strike me as isolated enough.
View 14 Replies
View Related
Jan 15, 2009
I'd like to find a way to mount a windows file share securely (encrypted) as I'll be communicating over the Internet.
View 4 Replies
View Related
Jul 30, 2010
Can't I forward a program window from my laptop to my desktop securely, both running Linux?How to ssh -X an existing window program just like the 'screen' program does?This question came up with my friends when watching an episode of 24! "Almeida send me your screen"
View 1 Replies
View Related
Jan 4, 2011
This one being Ubuntu 9.10 (yes, I know I really should upgrade). I keep a number of confidential files in a TrueCrypt container which is a standalone file in my Documents folder. I'd like to delete some of these, but I want to do it as securely as I can, but I believe if I simply hit 'Delete' with the file selected it'll move the file to the Deleted Items folder. This, I assume, means that the file is taken out of the encrypted volume and stored unencrypted in the Deleted folder.
I've been reading a little about the Shred command, and there seems to be some question about whether it works effectively with a journalled file system; and since I have no idea whether I'm using a journalled file system, or how to find out, I'm treating Shred and other over-writing secure deletion tools as ineffective for now.
With this in mind, can anyone advise me how I can protect the file stored in the TrueCrypt volume, and delete it in place, without taking it out of the encrypted area? And, further to that, can anyone tell me whether in fact the file is actually secured while it's in the encrypted volume? For all I know, just opening the volume may result in copies being made somewhere (apart from RAM).
View 5 Replies
View Related
Jun 27, 2011
My company needs to send sensitive data across to another company, 800gb of .dpx. The way I have thought of is:
E-Sata/1TB WD black.
True-encrypted/ hw accelerated aes (3x machines being built with 2600k)
Sha1sum on each file.
The main goal is to make sure that
1. The files that were transferred off the server onto the drive, are exactly the same.
2. Secure.
3. Fast.
View 9 Replies
View Related
Feb 2, 2009
I am looking for an API in JAVA which gives me functionality to copy a file to remote host in secure manner like (SCP).
View 1 Replies
View Related
May 15, 2011
i want to remove some of my app such as dragon, juk all of them are installed on my computer at installation of fedora ,now i want to erase them how i can do it?i tempted to remove them by this commands:
yum erase juk
yum remove juk
rpm -e juk
but none of them works and messages cannot find juk or dragon.
View 6 Replies
View Related
Jan 14, 2010
I have recently installed ubuntu on a previously vista operated laptop, now i need to eradicate all of vista i care not for it at all, I've read some of the threads here and saw someone say something about ubuntu overwriting everything on my hard drive including vista, is that dangerous, easy, and the most efficient way of doing this. i also tried removing the partition of vista by following a response to a thread, using gparted but now im stuck and i failed horribly (very limited computer knowledge).
View 11 Replies
View Related
Jan 27, 2010
ABRT 'sucks' Will my system die if I remove abrt* will this work:
Code:
yum remove abrt*
and what is the difference between 'yum remove' and 'yum erase' ?
View 7 Replies
View Related
Aug 9, 2011
I have a CF card I'd like to erase. My CF card reader is connected to my Linux machine via USB. How do I do a secure erase (i.e., the ATA Secure Erase functionality) of the CF card?
I have tried hdparm --security-erase NULL /dev/sdc, but I get an error: ERASE_PREPARE: Invalid exchange. In fact, any hdparm command gives me the same error:
# hdparm -I /dev/sdc
/dev/sdc:
HDIO_DRIVE_CMD(identify) failed: Invalid exchange
I read somewhere that hdparm can't do an ATA Secure Erase of a drive that is connected over USB. Is this true? I tried using sdparm, but sdparm doesn't seem to have the capability to send the ATA Secure Erase command to the CF card. So, what is the proper way to do this?
View 1 Replies
View Related
Aug 3, 2010
I work for a public school and we are implementing a number of Ubuntu NBR 9.1 netbooks. I wanted to use Likewise Active Directory for authentication, but have problems with the software so now I'm onto another solution for our problem.
We are going to have one login for all users (Students, is the name). The problem with this is that Website passwords can inadvertantly be stored, potentially compromising users personal data. Additionally, I don't want to have any files left in the Students profile in case people accidentally save personal information in their files.I'm thinking there are potentially two solutions:
1. The Students profile is deleted when the user logs off. This will erase web history and files
2. The Students account is always logged in with a temporary profile (or no profile, if that is possible) that deletes itself at logoff because it is temporary.
I'm having a hard time coming up with search terms for a solution like this, so I thought I would put the question to the experts.
View 1 Replies
View Related
Oct 11, 2010
Several moths ago I installed Ubuntu 10.10 Maverick Meerkat alfa3 in a newly created partition while I was using Ubuntu 10.04 Lucid Lynx. After I installed the 10.10 alfa3, I realized that it also installed its grub. Moreover that grub could not detect the kernel updates of 10.04. Thus, I recovered the grub of 10.04 via live CD. Interestingly after I returned the grub of 10.04 the boot time of 10.04 has considerably increased.
For example, the Ubuntu splash screen appears 20 seconds after selecting Ubuntu in Grub menu. I thought that a fresh installation for 10.10 final release would solve the problem but it seems that I'm still getting the same boot time until the splash screen is the same. It seems that I need a fresh installation of Grub. The methods that are introduced following url are just recovers Grub. I need to erase and reinstall the Grub. [URL]
View 2 Replies
View Related
Jan 27, 2011
that's my problem, can't find a way to erase 2 files that apparently don't want to move to the rubish bin. it says: can't move the file to trash, wan't to erase it permanently? I click on erase and the thing still there! could you please get me some commands? and by the way, how do I find how to use the command line so I don't bother you all the time? would it take me a hole engineering carrer or something? any 'document' recommended?
View 9 Replies
View Related
May 2, 2011
job installing windows XP and a partion ubuntu (?) on my desktop compooper. telling him i have no knowledge of ubuntu, he still isntalled it. I am giving this computer to my parents, and want to just put Windows XP on it. here is what a half *** job means, windows XP doesn't have the sound and ethernet driver. he couldn't find them to install them onto the computer...and i keep getting errors all over the place when i try and do things on ubuntu.
I downloaded Windows XP Professional 64bit Corporate yesterday and burned it to a CD. Restarted the computer so it will boot but it just keeps going to the screen asking which system I want to log in to. NOW HERE IS THE KICKER.... when i try to go onto the windows XP side, it is coming up with an error that says I need to activate windows. when i click yes, it says i have already activated. when i click on the user it repeats what i just stated. so now i can't even get into the windows xp side.
View 5 Replies
View Related
May 8, 2011
I'm having a problem trying to uninstall Quicksynergy all the way.first i did sudo apt-get remove synergy then sudo apt-get purge synergy.Checked in synaptic manager and software center that they did not show it. reinstalled synergy through the software center. and it is still showing me the name/ ip of my client.so this tells me it did not uninstall everything. i have searched the file system for synergy.conf with no luck been high and low on the web but no luck.
View 2 Replies
View Related
Jun 18, 2011
I got 8.10 to load and run on my set up, got disc burned ready for fresh install but won't boot from disc? erasing the drive is no issue so no problem there, i at least have a taste for this now and are liking it.is there a way to erase the hard drive, to get the disc to boot so i can install a supported version? i have kubuntu 11.04 ready to go.from playing on this kde version am really impressed and like this.smokes windows all to pieces, though i like my games for window too
View 8 Replies
View Related
Sep 2, 2010
What will be an easy and reliable way to completely erase a hard drive excluding with a hammer.I have several 40G IDE Hard drives, running Linux or Windows, for disposal. A friend of mine needs them. I want completely erase all data before delivering them to him. Googling "How to completely erase a hard drive" brought me many suggestion.
View 9 Replies
View Related