Security advice needed on available freeware tools...please advise

D

David

1. can anybody tell me if any "easy to use" freeware exists to
permanently delete all the files WHICH HAVE ALREADY been purged from
the recycle bin???
If files have already been purged from the recycle bin then do:
1. a defrag.
2. Copy enough files to fill most of the free space on the disk. Use a
temporary directory to achieve this and make sure you copy both large
and small files. You will have to leave some space at the end of the
drive for defrag to work but you can just erase enough files for this
purpose.
3. Do another defrag.
4. Delete the copied files.
5. Defrag yet again.

If anyone can recover files after all of that then he would have to be
a magician but if you are still in doubt go through the whole business
again using a bunch of different files to copy. I rarely use the
recycle bin. It just gets in the way most of the time.
2. I assume the best way to permanently delete stuff from now on is to
use "eraser" and that there is no added measures that can be taken?.

3. is "eraser" truely an unrecoverable delete or can even this tool
leave forensic evidence which perhaps a geek can recover???.
I would not bother with "eraser". Just use the above system every so
often. I do it about once a month. You may want to do it more often.
6. Is it possible to reset my zonealarm to its "new" state so i can
start the whole "allow/diss-allow" access prosess again??..i have
perhaps in the past accidently given the "allow" access permission to
some nasty intruders and want to start from scratch again.
Yes. Close your internet connection and ZoneAlarm. Browse to
C:\WINDOWS\Internet Logs. Delete all files in this directory. Restart
ZoneAlarm and it's as if it has just been installed. All programs will
have to ask for permission to access the net. Do not restart your
internet connection until after ZoneAlarm has been restarted.

Note: This will delete all log files from ZoneAlarm so you may want to
_not_ delete these. They are obvious.
 
M

Mandy Abbett

If files have already been purged from the recycle bin then do:
1. a defrag.
2. Copy enough files to fill most of the free space on the disk. Use a
temporary directory to achieve this and make sure you copy both large
and small files. You will have to leave some space at the end of the
drive for defrag to work but you can just erase enough files for this
purpose.
3. Do another defrag.
4. Delete the copied files.
5. Defrag yet again.

If anyone can recover files after all of that then he would have to be
a magician

What a long winded way to achieve absolutely **** all. Forensics will
beat magicians with this method.
 
D

David

What a long winded way to achieve absolutely **** all. Forensics will
beat magicians with this method.

I doubt that very much. You obviously have little knowledge of the
mechanics of disk storage.
 
C

Chrissy Cruiser

Really nothing to post. The inspections, sector by sector, showed
that all free space was overwritten by random data, including the
slack space (unused sections of file sectors/clusters) of valid files.
File names were also overwritten and zeroed out.
The programs used, like Encase, are all commercial progs and rather
expensive too.
If you are looking for a freeware forensic type program, the only one
I know of, other than hex editors, is a program called Directory Snoop
v.2.0 . That's an old freeware version about 4 - 5 years old, but it
will do the job of file/sector inspection. It might still be
available via a Google search, or maybe someone has a copy that they
can post or email.

Thanks for the response. I suppose what I have asked for on ACF before, and
I 'm not sure it exists, is someone to state with undeniable certainty that
this prog or that prog or both or several will be able to pass any known
detection and recreation of data.
 
M

Mandy Abbett

I doubt that very much. You obviously have little knowledge of the
mechanics of disk storage.

Like you obviously have very little knowledge of forensics.
 
J

jimbok

Thanks for the response. I suppose what I have asked for on ACF before, and
I 'm not sure it exists, is someone to state with undeniable certainty that
this prog or that prog or both or several will be able to pass any known
detection and recreation of data.

Hi Chrissy.
It is with a reasonable degree of certainty that data that has been
overwritten mutiple times with random data cannot be recovered with
any known software. It is with reasonable certainty that data that
has been overwritten with the Gutmann 35 pass overwrite cannot be
recoved by any known hardware recovery methods.
No evidence of recovery with either of the two methods above has ever
been offered in the private sector, which has some very talented
people.
However, since we - in the private sector - do not have access to all
of the potential hardware methods available to government agencies, no
one can say with absolute certainty that such overwritten data cannot
be recovered, only that it is highly unlikely.

jimbok
 
M

Mel

However, since we - in the private sector - do not have access to all
of the potential hardware methods available to government agencies, no
one can say with absolute certainty that such overwritten data cannot
be recovered, only that it is highly unlikely.

More than likely big brother already has an image of your hard disk(s).
 
C

Chrissy Cruiser

Hi Chrissy.

Hi Cutie jimbok!
It is with a reasonable degree of certainty that data that has been
overwritten mutiple times with random data cannot be recovered with
any known software. It is with reasonable certainty that data that
has been overwritten with the Gutmann 35 pass overwrite cannot be
recoved by any known hardware recovery methods.

Aw but for every 35x Gutmann, there is a 3 letter agency with a workaround,
imo.
No evidence of recovery with either of the two methods above has ever
been offered in the private sector, which has some very talented
people.
Understood.

However, since we - in the private sector - do not have access to all
of the potential hardware methods available to government agencies, no
one can say with absolute certainty that such overwritten data cannot
be recovered, only that it is highly unlikely.

So you are telling me to give up covert ops? Damn, they were soooooo much
fun.
 
C

Chrissy Cruiser

More than likely big brother already has an image of your hard disk(s).

I don't have a hard dick. I know you do, you have more than one?

Lemme ........oops "disks".

Nevermind.
 
D

David

True, however I think it is highly unlikely that any government has
any more advanced methods than those already known. Most devices are
developed by the private sector not governmental agencies. Add to that
the fact that any advanced recovery techniques are extremely expensive
and it becomes cost ineffective to attempt to recover anything that
has been erased with a modicum of care.
More than likely big brother already has an image of your hard disk(s).

Yours maybe. Mine, definitely not. I'm still on dial-up and am rarely
on line for more than half an hour at a time. I would notice if
excessive net activity occurred plus my firewall would stop any access
attempt before it happened.

Of course the best defense is not to visit questionable sites and do
not use your own credit card to pay for them if you feel you must,
Anyone is welcome to peruse the contents of my hard drives but if they
feel they are going to find any trade secrets or salacious pictures
they will be sorely disappointed. There are no pirated programs since
I mainly use freeware tools or legally acquired versions.
 
R

REM

Chrissy Cruiser <[email protected]> wrote:
Thanks for the response. I suppose what I have asked for on ACF before, and
I 'm not sure it exists, is someone to state with undeniable certainty that
this prog or that prog or both or several will be able to pass any known
detection and recreation of data.

I'd be leary of any such claim. The interworkings of data storage are
complex and are changing as disks change.

Unless a disk is overwrittten continually, there remains a bit pattern
in a layer from erased data. I have no clue as to the abilities of
tools and skills in data recovery. I do presume these are impressive
due to the importance to national security though.

I've only read what I can find on the subject and Guttman seems to
have seized this as an area on concentrated study and made his
findings public, although dated a bit.

Recovery is far more complex than the interworkings and thorough
erasing can make the job more tedious exponentially. As Gibson says, a
false sense of security is far worse than knowing that you have no
security at all. I buy into that mindset I guess.

Now, if you want real security, it will be on a clean machine that has
no internet access, such that no key loggers and such can be
introduced. That part is clear. Get a quality encryption program and
set up an encrypted volumn to hold all sensitive data. Use a complex
and long pass phrase. Check frequently for encryption updates. Even
the best have small flaws.

I have a book that I use to help retain it, because I'm just not that
smart. On a page number that has significance only to myself I chose
to start at a certain point and use the text, substituting certain
characters for other characters and making use of the high ascii
character set. The phrase is in the neighborhood of the maximum number
of characters the program will accept. It is not going to be brute
forced in our lifetimes. I do feel safe in saying that. The number of
possible permutations is mind boggling.

The passphrase is critical. It must be impervious to dictionary
attack, brute force attack, free from malicious programs that might
compromise it, not written on a post-it stuck to your monitor, and
long, very long.

For extra critical and valuable protection disable the swap file. The
machine will run slower, but you can be certain that bits and pieces
will not be written to random places on the disk. Quality programs try
to make certain that nothing is written to swap file, but why not be
certain? This is for a machine dedicated to security.

Then, if you feel that your baking recipes are in peril, you can wipe
the single file that holds the encrypted disk with Eraser using the
Gutmann algorithm (very slow), and maybe hit the entire disk with
other wiping algorithms if time allows.

Then, I'd offer that I would feel like I had real security in the
removal of those recipes.

Short of physical destruction of the equipment, that's my best idea in
personal security on a personal computer running Windoze.

For the nominal Windows PC that connects to the internet I don't
really think that real security is possible.

2 cents, keep the change...

BTW: I tried Eraser and it takes a long time. That's good. However, I
have a 30 gig primary partition and chose to stop Eraser, as I had
seen it in action. The program choked, leaving many large files with
illegal file names that were a PITA to remove. I had another no-name
program do this while I tried it years ago. The electricity flickered
off and I had no UPS at the time. I had 3/4's of my disk written in
filenames that were illegal and could not be removed.
 
C

Chrissy Cruiser

For the nominal Windows PC that connects to the internet I don't
really think that real security is possible.

2 cents, keep the change...

Golly, thanks so much for the effort and info, REM!
BTW: I tried Eraser and it takes a long time. That's good. However, I
have a 30 gig primary partition and chose to stop Eraser, as I had
seen it in action. The program choked, leaving many large files with
illegal file names that were a PITA to remove. I had another no-name
program do this while I tried it years ago. The electricity flickered
off and I had no UPS at the time. I had 3/4's of my disk written in
filenames that were illegal and could not be removed.

Yikes! Were you using Eraser to remove file leftovers in unused or "erased"
spaces? I use the Guttman with (I guess) success.
 
R

REM

Yikes! Were you using Eraser to remove file leftovers in unused or "erased"
spaces? I use the Guttman with (I guess) success.

Yes, I set it to wipe file tips and the unused space using Gutmann. I
hit the stop button and it locked up. I left it for several hours to
make sure and ended up rebooting an otherwise healthy system.
 
C

Chrissy Cruiser

Yes, I set it to wipe file tips and the unused space using Gutmann. I
hit the stop button and it locked up. I left it for several hours to
make sure and ended up rebooting an otherwise healthy system.

Bummer.
 

Ask a Question

Want to reply to this thread or ask your own question?

You'll need to choose a username for the site, which only take a couple of moments. After that, you can post your question and our members will help you out.

Ask a Question

Top