Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:srm -v -z (Score 2) 91

Well, it confounds it at any rate. But completely filling the device's memory 33 times in a row is pretty likely to overwrite everything at least once or twice - even the hidden "failure reserve" space if it's included in the wear leveling (and if it's not, then it doesn't yet hold any sensitive data, so there's no problem). Guttmann's values may be irrelevant to today's storage media, but that many repeated rewrites of anything still mostly does the job.

If you were an engineer in charge of destroying data printed on paper, and you decided on shred then burn then stir the ashes in water, how many times would you repeat the cycle in order to be sure the data was destroyed? Hint: if your recommendation is greater than one (in order to be pretty sure), check your job title, because you're probably Dilbert's pointy-haired boss.

Drives today work almost nothing like the drives of 20 years ago. They don't paint bit-bit-bit in a stripe, they encode a set of bits in every pulse of the write head. Alter it a tiny fraction, and it becomes a completely different set of bits, one that error correction won't be able to overcome.

Old disks were recoverable because the mechanisms weren't precise, and the data was written with big chunky magnets to assure it was readable. All that slop has been engineered out on order to achieve today's remarkable areal densities. One overwrite is all it takes - as long as you're overwriting it all.

Comment Re:And then throw it in a fire (Score 4, Informative) 91

This.

What is the value of a used device? Compare that to the risk of the data on that device going to a malevolent third party.

I've had people saying "oh, look at all these hard drives, you should totally sell them on ebay and I bet you could get $10 apiece for them!" Adding up the time I would waste running DBAN or sdelete or whatever, and keeping track of which ones have been wiped, and double checking to make sure everything is really gone, it's not worth the time.

A big hammer and a punch, driven deeply through the thin aluminum cover and down the platter area, takes about a second and leaves nothing anybody would bother trying to recover. You can quickly look at a drive and say "yes, this drive has been taken care of", or "hey, there's no jagged hole here, this drive isn't destroyed." The aluminum cover contains the shards if the platters are glass. I don't care who handles them after destruction. There's no worries about toxic smoke. And if you have to inventory them before shipping them to a recycler, the serial numbers are still readable.

Smashing a phone wouldn't destroy the data on the chips, so a fire is a somewhat safer option.

Comment Re:Problem traced (Score 4, Informative) 93

The "scanner" portion of these devices is typically an embedded system that drives a hardware sensor, and speaks USB out the back side. You could probably open one up, solder a cable to the right points on the scanner board, and you'd have exactly the simple and transparent scanner you requested.

But because the business wants a truckload (no pun intended) of functionality out of these scanners, they need it to have more capabilities. First, it needs to be on the network, or it won't give them any benefit. Next, it needs to be multi-tasking so it can display alerts, etc. Its primary task may be to inventory the stuff coming off a truck, its other tasks may include assigning work items to line employees, displaying alerts on the supervisors' screens, punching the timeclock for breaks, and possibly even employee email. To a lot of businesses, a browser based interface lets them run whatever kind of functions they want, without the expense of continually pushing a bunch of apps out to a bunch of random machines. So taking all that together, embedded XP is one (bloated) way of meeting all that.

So while the scanner itself is simple, it's the rest of the hardware in the device that was infested with XP and other malware.

Comment Driver support (Score 1) 502

Not to mention that they dropped driver support from the SBLive 5.1/Gold after XP, despite it being a *very* common card in many systems (partly, I believe, because it came with many Dell's and/or possibly HP's).

When Vista/7 came out, Creative dropped it like a hot rock and didn't provide a driver for the newer OS. There is a FOSS driver, but it lacked much of what was supported in the XP driver (while also adding other features).

Comment Re:USB DACs (Score 1) 502

What, you're telling me that my $5.00 USB "7.1 surround sound" card (that oddly only has two analog jacks) *ISN'T* as good as a high-end soundcard? :-)

Actually, the main advantage I've found for USB vs onboard sound - even with cheap USB - is that they tend to pick up less of the "electrical whine" that a lot of onboard stuff does. Dedicated cards oftimes have better filtering that keeps this out, and the onboard designs are better these days, but I do still find you can actually hear when you're moving the mouse from the background growl of many board-chip audio cards.

Comment Re:sounds like North Korea news (Score 1) 109

Hardly new. Slashdot frequently runs doom-is-nigh, overblown, click-baity summaries for the purposes of drawing in viewers (and thus, revenue). All those stupid social sites use vague headlines ending with "...you won't believe what happens next!" to try and intrigue viewers for the same reason. Calling it "mind control" is setting the bar pretty low.

Comment Re:As plain as the googgles on your face (Score 1) 56

As intrusive as the Google Glass has proven to be, it will only be worse when observation recording tech is more difficult to detect.

I disagree. The exact opposite: when people stop noticing, they will stop caring. It won't be perceived as intrusive anymore, and people will be less annoyed by it.

It's the conspicuousness of the camera in Google Glass, the constant reminder that you might be recorded, that makes most people feel creeped out. For the previous decade leading up to that product, nobody cared about small+cheap camera tech itself. And people walk/drive by fixed-position cameras all the time, and don't give a fuck there either. Peoples's behavior shows that "intrusiveness" happens when a cameras looks like a camera, and I suspect it also has something to do with being face-level, literally "in your face" and you're making eye contact with it, unlike the case with less conspicuous cameras. It was never about privacy; it's some aspect of self-consciousness kind of related to privacy, but a different thing.

You might say "maybe you, but I sure care. Hell yes it's about privacy." Of course you say that. I'm talking about how people behave and the emotions they display. Not their innermost secret thoughts that they are always terrified to express in voting booths or policy decisions, yet are happy to speak of on the Internet.

You know, the Internet, where they don't have a camera in their face making them all self-conscious! The Internet, where instead of a terrifying 1x1 pixel image that makes you think "WTF is that? That's weird! Are you watching me?" you now instead see a bunch of "like buttons" which are obviously for liking things, not getting your browser to send a request to an unrelated tracking server.

In addition, there's a certain inevitability about it all. The cameras have been there a long time, there are more today, and there will be even more tomorrow. You can't do anything about it, except stay at home. So you'll either accept or you'll go insane and get selected out. You'll handle it. (Contrast that to Google Glass, the one small camera out of the hundreds out there, that you actually recognize and is also rare enough that there's little social cost to shunning. With GG you can refuse to accept and also stay within social norms, so GG is different.)

Comment Criminal acts (Score 1) 100

I have a sideline job doing computer servicing/repair. Since the issues between Russia/Ukraine have ramped up, there's also been a noticeable uptick in online/banking fraud coming from Russia.
Thankfully the banks seem to be on the watch for this - the notify customers of unusual transactions, e.g. western union, to Russian accounts - so most of my work is just ensuring that machines are clean after the fact.

I won't say that this is state-sponsored, but likely more to issues alluded to with this guy: mainly that Russia doesn't seem to be very cooperative in dealing with known international criminals - especially with the poor international relations of current - and the criminal element are taking advantage of this.

Comment Re:Bitcoin isn't money but it's still a financial (Score 1) 135

Bitcoin's primary purpose is to traffic/launder money and goods.

Objection. Will stipulate that its primary purpose is to traffic. But I call mega-bullshit on its primary or even secondary purpose being to launder, though there might be a way one could use Bitcoin for that.

Comment You don't exist. Go away (Score 1) 608

I've actually had servers say that to me.

Usual cause: trying to execute certain commands while logged in as a user that no longer exists in /etc/passwd.

Also known as "oops I overwrite /etc/password!".

Bonus points if you get this while logged in a root. An associate of mine discovered that it's bad to use system variable names when he had this one in a script he ran (as root):
    deluser $USER

Slashdot Top Deals

New York... when civilization falls apart, remember, we were way ahead of you. - David Letterman

Working...