Advertisement
Guest User

Untitled

a guest
Apr 15th, 2017
108
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.70 KB | None | 0 0
  1. secureErase [freespace] level device
  2. Erase, using a "secure" (but see the NOTE below) method, either a whole-disk (including all of its par-
  3. titions if partitioned), or, only the free space (not in use for files) on a currently-mounted volume.
  4. Secure erasing makes it harder to recover data using "file recovery" software.
  5.  
  6. Erasing a whole-disk will leave it useless until it is partitioned again. Erasing freespace on a vol-
  7. ume will leave your files intact, indeed, from an end-user perspective, it will appear unchanged, with
  8. the exception that it will have attempted to make it impossible to recover deleted files.
  9.  
  10. If you need to erase all contents of a partition but not its hosting whole-disk, use the zeroDisk or
  11. randomDisk verbs. Ownership of the affected disk is required.
  12.  
  13. Level should be one of the following:
  14.  
  15. o 0 - Single-pass zero-fill erase.
  16.  
  17. o 1 - Single-pass random-fill erase.
  18.  
  19. o 2 - US DoD 7-pass secure erase.
  20.  
  21. o 3 - Gutmann algorithm 35-pass secure erase.
  22.  
  23. o 4 - US DoE algorithm 3-pass secure erase.
  24.  
  25. NOTE: This kind of secure erase is no longer considered safe because modern devices have wear-leveling,
  26. block-sparing, and possibly-persistent cache hardware. The modern solution for quickly and securely
  27. erasing your data is strong encryption, with which mere destruction of the key more or less instantly
  28. renders your data irretrievable in practical terms.
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement