shred: passwords-save: pass 1/4 (random) .
shred: passwords-save: pass 2/4 (random) .
shred: passwords-save: pass 3/4 (random) .
shred: passwords-save: pass 4/4 (000000) .
shred: passwords-save: remove
shred: passwords-save: renamed to 00000000000000
shred: passwords-save: removed
The wipe command works only for magnetic media , not hard drives. It works with the so-called " magnetic force microscopy ", allowing others to recover two or three "data" in the end, which can be written to your drive, but as stated. above it only works with magnetic media, not hard drives and not all drives are eligible, you can determine the type of system drive you have and see if wipe can work with them. by looking at the result from this command, place 0 = SSD (magnetic media) and 1 = HDD (hard drive):
$ cat / sys / block / sda / queue / rotational
0
Below is an example of a wipe command when operating:
$ wipe -rfi temp
Entering directory 'temp'
Wiping mno, pass 34 (34)
Mno file (340 bytes) wiped
Wiping fileA, pass 34 (0)
FileA file (808 bytes) wiped
Wiping klm, pass 34 (0)
File klm (1056 bytes) wiped
Wiping lmn, pass 34 (0)
File lmn (3827 bytes) wiped
Wiping fileC, pass 34 (0)
File file (842 bytes) wiped
Wiping myfiles.tar, pass 34 (0)
File myfiles.tar (122880 bytes) wiped
Wiping fileB, pass 34 (0)
FileB file (5092 bytes) wiped
Going back to directory / home / shs
Operation finished.
7 các tập tin wiped và 0 tập tin này bị bỏ qua trong một thư mục, 0 symlinks removed, nhưng không theo sau, 0 lỗi đã thực hiện
In this example, r will receive a wipe command to recurse into directories if they exist, f will avoid having to verify that each file is corrupted, and i make the command run in detail ("i" is " informative "). ").
Another tool to completely delete files is called " secure-delete ", although the command that the package will add to your system is called srm as in " secure rm ".
Here's an example of how to use this tool:
$ srm -vz BoD_meeting
Đang dùng / dev / urandom cho dữ liệu nhập vào.
Wipe mode is secure (38 special passes)
Wiping BoD_meeting ************************************** Removed the BoD_meeting . Done file
Note the number of passes that have been made to ensure safe file removal.
Because there are several options on how to safely remove files from the Linux system, the following example will run a simple test - create some copies of the same file and safely delete them each The tool is discussed above. Here's how to use a tool called foremost to try to recover files of the same type, from the affected partition.
$ shred -zvu penguin1.png
$ wipe -fi penguin2.png
$ srm -vz penguin3.png
$ sudo foremost -i / dev / sda1 -t png -o / root / rescued
Processing: / dev / sda1
| ************************************************* ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************************************** ******************************
************************** |
The foremost command will take a few minutes to run. This command found more than 51,000 .png files in the example. In any case, it should be noted that the files taken from your drive during the recovery process will not have the original name, as they are lost when the affected folder file has been modified when deleting the file. Instead, your restored files will have the same name as 105210720.png .
The foremost command has options to select the type of file you want to recover. Check the man page for details. And remember that it cannot limit your search to a specific directory because, at this time, folders are no longer relevant.
If you want to test the complete deletion of files from the system and then use the foremost tool to see what can be recovered, consider restoring files to extract media or at least not simply delete files , when you are testing them, or basically, you will double the number of recovery files in the next test. The restored files are independent of the original files, even though they have the same content.
See more: