Security Basics mailing list archives

RE: Interesting One


From: "Shayla Anthony" <santhony () telerama com>
Date: Tue, 29 Oct 2002 18:35:50 -0500

I know of a few programs that you can set to delete files up to 30 times in
a row. I was allways wondering why they were able to go so high, and allways
assumed the only information that can't be retrieved is from a hard drive
with bullet holes (just in case* (the FBI and other police forces send hard
drives back to HDD manufacturers with bullet holes to make sure that data
cant be retrieved - at least one of the police departments I am familiar
with did and said others did as well...)

Shayla

-----Original Message-----
From: Dave Adams [mailto:dadams () johncrowley co uk]
Sent: Monday, October 28, 2002 5:06 PM
To: security-basics () security-focus com
Subject: Interesting One


Greetings Folks,

I had an interesting conversation today with someone from FAST
(Federation
Against Software Theft) They pretend not to be a snitch wing of the BSA.
Anyway, to get to the point, the guy that came to see me said that their
forensics guys could read data off a hard drive that had been written
over
up to thirty times. I find this very hard to believe and told him I
thought
he was mistaken but the guy was adamant that it could be done. My
question
is, does anyone have any views on this, or, can anyone point me to a
source
of information where I can get the facts on exactly how much data can be
retrieved off a hard drive and under what conditions etc etc.

Thanks

Dave Adams



This message (and any associated files) is intended only for the
use of the individual or entity to which it is addressed and may
contain information that is confidential, subject to copyright or
constitutes a trade secret. If you are not the intended recipient
you are hereby notified that any dissemination, copying or
distribution of this message, or files associated with this message,
is strictly prohibited. If you have received this message in error,
please notify us immediately by replying to the message and deleting
it from your computer. Messages sent to and from
John Crowley (Maidstone) Ltd may be monitored.

Internet communications cannot be guaranteed to be secure or error-free
as information could be intercepted, corrupted, lost, destroyed, arrive
late or incomplete, or contain viruses. Therefore, we do not accept
responsibility for any errors or omissions that are present in this
message, or any attachment, that have arisen as a result of e-mail
transmission. If verification is required, please request a hard-copy
version. Any views or opinions presented are solely those of the author
and do not necessarily represent those of John Crowley (Maidstone) Ltd.


Current thread: