Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Fri, 13 Aug 2004 12:56:48 -0400 Cole Tuininga <colet at code-energy.com> wrote: > If you want to be more secure, you could always have /tmp be a tmpfs > (aka a ram disk). Then the data is never stored on a hard drive > anyway. > > Well, excluding swap I suppose. Nevermind. I would think that this is probably a good reason that a file system level wipe is not overly affective. There is data left in the swap file, in the journals, ... I think something like shred(1) works only to make it more difficult for another online user to see data left in a file. Since John Malloy was the original poster, maybe John can be more specific as to why he wants to use it, and how clean. -- Jerry Feldman <gaf at blu.org> Boston Linux and Unix user group http://www.blu.org PGP key id:C5061EA9 PGP Key fingerprint:053C 73EC 3AC1 5C44 3E14 9245 FB00 3ED5 C506 1EA9 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <http://lists.blu.org/pipermail/discuss/attachments/20040813/0639ac1b/attachment.sig>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |