Nieuws:

Welkom, Gast. Alsjeblieft inloggen of registreren.
Heb je de activerings-mail niet ontvangen?

Auteur Topic: programma's vinden  (gelezen 609 keer)

Offline Spinoza

  • Lid
programma's vinden
« Gepost op: 2012/05/20, 15:11:58 »
Via het Ubuntu Software centrum heb ik enkele programma's geïnstalleerd ( secure-deletion / en Wipe ), maar ik kan ze niet via DASH terugvinden. ( Ubuntu 11.10 ); Tips ??

Offline jan11000

  • Lid
Re: programma's vinden
« Reactie #1 Gepost op: 2012/05/20, 15:34:37 »
Volgens mij zijn dat textmode commando's, dus dos, te gebruiken in de terminal.
Zoek met google hoe te gebruiken.

Hier dit is om je hd leeg te maken, dus partities weghalen en mbr leeg maken, zodat er geen virussen kunnen blijven zitten:
Je kan wel files terug halen.
Dit gaat heel snel.
Let op harde schijf wordt nu helemaal leeg gemaakt:

Nu booten van de ubuntu livecd,
Gparted starten,
kies rechtsboven je hd,
verwijder alle partities,
boven in gparted de pulldown menu, kiezen device, Create partion table(mbr wissen),
boven in gparted de pulldown menu, kiezen partition, manage flags, vink hier alles uit,
doe dit voor alle hd's, reboot en installeer ubuntu.

Zo maak je de hd ook schoon van virussen, formateren is niet genoeg.


Dit is om alle dat te verwijderen, maar hier heb je ook livecd voor:

http://www.dban.org/ deze wordt het meeste gebruikt.
secure erase cd
parted magic
ubcd
hirens boot cd
ihavethepassword


sudo shred -n2 -v /dev/sdx
sdx is de hd die je wilt leegmaken, kies hier wel de goede.
Dit vernietigd alle data, maar duurt lang kwa tijd.


srm - secure remove
This tool is basically a more advanced version of the "shred" command. Instead of just overwriting your files with random data, it uses a special process - a combination of random data, zeros, and special values developed by cryptographer Peter Gutmann - to really, really make sure your files are irrecoverable. It will assign a random value for the filename, hiding that key piece of evidence. srm is used like this:
srm myfile.txt
Or, for directories:
srm -r myfiles/

smem - secure memory wipe
While it's true that your computer's RAM is emptied when you power-off your computer, you probably didn't know that residual traces of data remain in memory, like hard drives, until they are overwritten many times. This means that it's relatively easy for someone with the right tools to figure out what you had stored in RAM, which may be the contents of important files, internet activity, or whatever else it is you do with your computer.

The basic use of smem is the same as srm, although it is a good deal slower. There are options to speed things up, but they increase the risk by performing fewer overwrite passes. For a complete list of options, read the manual on smem (the man smem command), but its basic use is just running the "smem" command, as such:

smem

sfill - secure free space wipe
sfill follows the same general method as srm. It is used to wipe all the free space on your disk, where past files have existed. This is particularly useful if you are getting rid of a hard disk for good; you can boot a LiveCD, delete everything on the disk, and then use sfill to make sure that nothing is recoverable. You may have to be root in order to use this tool effectively, since regular users might not have write access to certain filesystems, and you might have a quota enabled. sfill usage is as such:

sfill mountpoint/

sswap - secure swap wipe
The sswap program is used to wipe your swap partitions, which store the data of running programs when your RAM is filled up. Therefore, feel a need to run smem, it's probably a good idea to run sswap, too. However, before you use it you must disable your swap partition. You can determine your mounted swap devices by running:
cat /proc/swaps
Or looking in your /etc/fstab file for filesystems of the type "swap". In my case, my swap partition is /dev/sda5, so to disable it I run:
sudo swapoff /dev/sda5
Once your swap device is disabled, you can wipe it with sswipe. In my case, I run:
sudo sswap /dev/sda5
If you aren't running this as root (sudo), you're likely to get a permission denied error. As with any of the above commands, you can get more information while it's running by adding the "-v" option for verbose mode.

« Laatst bewerkt op: 2012/05/20, 15:46:11 door jan11000 »