Security Basics mailing list archives
Re: Interesting One
From: Candice Ward <mcward () nc rr com>
Date: Wed, 30 Oct 2002 18:19:34 -0500
Of course it wouldn't need to be done at all after the fact if a simple keyboard logger had already been placed on the monitored computer while its user or owner was away from the office.... on 10/30/02 8:42 AM, Tim Donahue at TDonahue () haynesconstruction com wrote:
Yes, it can be done.. it would cost about 100k per drive and the ability to access an electron scanning microscope. At 30 times I highly doubt they could recover anything of any value anyway. Using most commercially available products like "Encase", you can recover files that have been deleted, but not overwritten. Once the data is overwritten you are getting into using tools which are not available to the general public as far as I am aware. MikeThis is the reason that the standard destroying drives that contain classified material is the physical destruction of the drive. I am not talking hitting the controller board with a hammer even, the platters need to be destroyed. From what I remember reading on this list, the prefered methods are incineration, and / or a bucket of a strong acid.
Current thread:
- RE: Interesting One lvickers (Oct 31)
- <Possible follow-ups>
- RE: Interesting One Jimmy Liang (Oct 31)
- Re: Interesting One easy (Oct 31)
- RE: Interesting One Michael Vaughan (Oct 31)
- Re: Interesting One Candice Ward (Oct 31)
- RE: Interesting One Tim Donahue (Oct 31)
- RE: Interesting One Carol Stone (Oct 31)
- RE: Interesting One Rygg Christian (Oct 31)
- RE: Interesting One Trevor Cushen (Oct 31)
- Re: Interesting One ONEILL David J (Nov 01)
- Re: Interesting One Greg van der Gaast (Nov 01)
- RE: Interesting One Leonard.Ong (Nov 01)
- RE: Interesting One Holmes, Ben (Nov 01)
- RE: Interesting One Trevor Cushen (Nov 01)
- Re: Interesting One Meritt James (Nov 01)
(Thread continues...)