Security and harddisk crubbing in Linux

Sam Couter sam at topic.com.au
Fri Oct 26 16:40:50 EST 2001


Drake Diedrich <dld at coyote.com.au> wrote:
>    /dev/urandom would take about a day to generate the necessary ~60G of
> pseudorandom data per pass, but you could always write very short programs
> (about three lines of C) to generate acceptable patterns instead and cut
> that to the hard drive writing speed (about an hour/pass).

Wiggle yer mouse for a while. That should generate a fair bit of
entropy.

>    [ Obligatory dig: why does DoD bother to create security standards for
>      Windows machines? Hasn't the horse already bolted? ]

Obligatory bite: I don't even know why they would ever allow sensitive
data *on* a Windows machine.
-- 
Sam Couter          |   Internet Engineer   |   http://www.topic.com.au/
sam at topic.com.au    |   tSA Consulting      |
OpenPGP key ID:       DE89C75C,  available on key servers
OpenPGP fingerprint:  A46B 9BB5 3148 7BEA 1F05  5BD5 8530 03AE DE89 C75C
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 232 bytes
Desc: not available
Url : http://lists.samba.org/archive/linux/attachments/20011026/5749551a/attachment.bin


More information about the linux mailing list