Samuel Krieg a écrit : > hervé desrues a écrit : >> >> et /dev/zero ? >> >> rvdru >> > > J'ai entendu dire dans mes rêves qu'on arrive à savoir quelle était > l'ancienne position du bit après un passage avec /dev/zero. (Sous > réserve d'avoir le matériel approprié). > > A confirmer ... > apt-cache show wipe Package: wipe Priority: extra Section: utils Installed-Size: 132 Maintainer: Debian Forensics <forensics-devel@lists.alioth.debian.org> Architecture: i386 Version: 0.21-5 Depends: libc6 (>= 2.7-1) Filename: pool/main/w/wipe/wipe_0.21-5_i386.deb Size: 43828 MD5sum: bc99aadddb21f127ab2dea5bd723e652 SHA1: 81e51d91b2a9ba17e3f2c7fa0c4fce75982a6622 SHA256: 6fb04b2a51210dad535ab9a437a8afce1e005dce3d84889ac3d31c825a947877 Description: Secure file deletion Recovery of supposedly erased data from magnetic media is easier than what many people would like to believe. A technique called Magnetic Force Microscopy (MFM) allows any moderately funded opponent to recover the last two or three layers of data written to disk. Wipe repeatedly writes special patterns to the files to be destroyed, using the fsync() call and/or the O_SYNC bit to force disk access. Homepage: http://abaababa.ouvaton.org/wipe/ Tag: interface::commandline, role::program, scope::utility, works-with::file
Attachment:
signature.asc
Description: OpenPGP digital signature