Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
I might have mentioned this before, but when I was an HP consultant at Raytheon in 1999, we had a system that was in the classified lab that Raytheon wanted to move out of the lap. One of our consultants wrote a wipe utility that was approved by security. Wiping an entire drive is more effective than wiping a file, at least under Unix and Linux. Information contained in a file can appear in other places, such as the swap area. I don't think that there should be too much of an issue on the journals since they contain meta data, not the actual data. -- Jerry Feldman <gaf at blu.org> Boston Linux and Unix user group http://www.blu.org PGP key id:C5061EA9 PGP Key fingerprint:053C 73EC 3AC1 5C44 3E14 9245 FB00 3ED5 C506 1EA9 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 189 bytes Desc: not available URL: <http://lists.blu.org/pipermail/discuss/attachments/20040917/46a93734/attachment.sig>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |