![]() In this article we will create one file called: “ credit_card.db” which will contain some simulated credit card information as listed in Figure 1.2. Once you have mounted the partition you can write some simple test files. Linux-a2f6:/media # mount /dev/sda3 /media/sda3įigure 1.1: Mounting the “/dev/sda3” partition. Once you have formatted the partition you will need to mount the partition to write some test files, Figure 1.1 shows the command used to mount the “ /dev/sda3” partition. ![]() ReiserFS is successfully created on /dev/sda3.įigure 1: Formatting “/dev/sda3” partition with Reiser file system. Journal Size 8193 blocks (first block 18) Number of blocks consumed by mkreiserfs formatting process: 8252 linux-a2f6:/media # mkfs.reiserfs /dev/sda3 ![]() The command we will use to format the partition is “ mkfs.reiserfs” followed by the partition we are using “/dev/sda3”, as shown in Figure 1. The first step we need to do is format our partition with the Reiser file system. We will be using the “ strings” command to perform simple data recover of the simulated sensitive data from the partition. We will have a blank Linux partition “/dev/sda3” which we will format with a Reiser file system and there will also be multiple files with simulated sensitive data which we will try and recover. The three tools we will be looking at are “scrub”, “shred” and “dd”, these tools all provide a means of overwriting data multiple times. In this article we are going to look at three methods to securely wipe partitions and deleting sensitive files making it difficult for malicious users to recover. This article was tested on SUSE Linux Enterprise Server and SUSE Linux Enterprise Desktop. There are three utilities we are going to look at which mitigate the chance of malicious users recovering sensitive data. Files and partitions left with possible file recovery of sensitive data.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |