<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: OpenVMS file shredder in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467955#M66529</link>
    <description>Great response John!  I really appreciate your help.</description>
    <pubDate>Thu, 20 Jan 2005 16:55:46 GMT</pubDate>
    <dc:creator>Brian Knapp</dc:creator>
    <dc:date>2005-01-20T16:55:46Z</dc:date>
    <item>
      <title>OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467953#M66527</link>
      <description>We recently discontinued use of our AlphaServer 4100 and have toiled with the idea of selling it.  I was wondering if anyone knows of a method to thoroughly scour the hard drives.  Thank you for any ideas.&lt;BR /&gt;&lt;BR /&gt;Brian</description>
      <pubDate>Thu, 20 Jan 2005 15:49:43 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467953#M66527</guid>
      <dc:creator>Brian Knapp</dc:creator>
      <dc:date>2005-01-20T15:49:43Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467954#M66528</link>
      <description>Brian,&lt;BR /&gt;&lt;BR /&gt;  It depends on how concerned you are about the data. There are labs that (for a BIG price) can recover data from disk platters anything up to 16 write cycles deep. So, for absolute security you need to follow the US DoD procedure which is, roughly:&lt;BR /&gt;&lt;BR /&gt;1)  Perform numerous runs of writing 0s to all accessible blocks on the disk&lt;BR /&gt;&lt;BR /&gt;2)  Perform numerous runs of writing a security erase pattern to all accesible blocks on the disk&lt;BR /&gt;&lt;BR /&gt;3)  Degauss drive in a huge magnetic field&lt;BR /&gt;&lt;BR /&gt;4)  Feed drive through shredder&lt;BR /&gt;&lt;BR /&gt;5)  Take shards from shredder and incinerate&lt;BR /&gt;&lt;BR /&gt;6)  Take resulting ashes and dispose in a secure landfill&lt;BR /&gt;&lt;BR /&gt;(If you think I'm kidding, look it up! Remember security doesn't have to make any sense, it just has to be secure!)&lt;BR /&gt;&lt;BR /&gt;  Now, for more sane people, this is both unnecessary and expensive. You can erase a drive with:&lt;BR /&gt;&lt;BR /&gt;  $ INIT/ERASE disk&lt;BR /&gt;&lt;BR /&gt;  This will fill the drive with zeros.&lt;BR /&gt;&lt;BR /&gt;  For a slightly more rigourous "scrub" you can write an erase pattern to the drive with:&lt;BR /&gt;&lt;BR /&gt;  $ MOUNT/FOREIGN ddcu:&lt;BR /&gt;  $ ANALYZE/MEDIA -&lt;BR /&gt;    /EXERCISE=(-&lt;BR /&gt;     NOKEEP,-&lt;BR /&gt;     PATTERN=(32bitvalue,32bitvalue,â ¦)) -&lt;BR /&gt;    ddcu:&lt;BR /&gt;&lt;BR /&gt;  According to $ERAPAT, one of the DoD security erase patterns is %XDB6DB6DB, so:&lt;BR /&gt;&lt;BR /&gt;  $ MOUNT/FOREIGN ddcu:&lt;BR /&gt;  $ ANALYZE/MEDIA -&lt;BR /&gt;    /EXERCISE=(-&lt;BR /&gt;     NOKEEP,-&lt;BR /&gt;     PATTERN=(%x0,%XDB6DB6DB)) ddcu:&lt;BR /&gt;  $ ANALYZE/MEDIA -&lt;BR /&gt;    /EXERCISE=(-&lt;BR /&gt;     NOKEEP,-&lt;BR /&gt;     PATTERN=(%XDB6DB6DB,%x0)) ddcu:&lt;BR /&gt;&lt;BR /&gt;  Two passes with different patterns each time.&lt;BR /&gt;&lt;BR /&gt;  For a system disk, you should be able to do this from the $$$ prompt having booted from CD.&lt;BR /&gt;&lt;BR /&gt;  Bear in mind that this may not scrub bad blocks that have been replaced, so again, it all depends on how secure you want it to</description>
      <pubDate>Thu, 20 Jan 2005 16:48:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467954#M66528</guid>
      <dc:creator>John Gillings</dc:creator>
      <dc:date>2005-01-20T16:48:52Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467955#M66529</link>
      <description>Great response John!  I really appreciate your help.</description>
      <pubDate>Thu, 20 Jan 2005 16:55:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467955#M66529</guid>
      <dc:creator>Brian Knapp</dc:creator>
      <dc:date>2005-01-20T16:55:46Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467956#M66530</link>
      <description>Brian,&lt;BR /&gt;&lt;BR /&gt;A CPU boand cheaper methode than John's is to copy the VMB.EXE or the APB.EXE continuesly over the disk after have initialising this on.&lt;BR /&gt;&lt;BR /&gt;$ INIT &lt;DEVICE&gt;/ERASE CLEAR&lt;BR /&gt;$ MOUNT &lt;DEVICE&gt; CLEAR&lt;BR /&gt;$ COPY SYS$SYSTEM:APB.EXE &lt;DEVICE&gt;:[000000]CLEAR.TST&lt;BR /&gt;$ LOOP:&lt;BR /&gt;$    ON ERROR THEN GOTO LOOP_END&lt;BR /&gt;$    APPEND SYS$SYSTEM:APB.EXE &lt;DEVICE&gt;:[000000]CLEAR.TST&lt;BR /&gt;$    GOTO LOOP&lt;BR /&gt;$ LOOP_END:&lt;BR /&gt;$ DISMOUNT &lt;DEVICE&gt;&lt;BR /&gt;$ INIT &lt;DEVICE&gt;/ERASE CLEAR&lt;BR /&gt;&lt;BR /&gt;The reason why we use VMB.EXE or APB.EXE is this file is not a program but is actualy a processor dump.&lt;BR /&gt;&lt;BR /&gt;If needed, repeat procedure.&lt;BR /&gt;&lt;BR /&gt;AvR&lt;/DEVICE&gt;&lt;/DEVICE&gt;&lt;/DEVICE&gt;&lt;/DEVICE&gt;&lt;/DEVICE&gt;&lt;/DEVICE&gt;</description>
      <pubDate>Fri, 28 Jan 2005 07:26:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467956#M66530</guid>
      <dc:creator>Anton van Ruitenbeek</dc:creator>
      <dc:date>2005-01-28T07:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467957#M66531</link>
      <description>"processor dump"?&lt;BR /&gt;&lt;BR /&gt;And I thought all the time that VMB, APB and IPB.EXE were the primary bootstrap code.</description>
      <pubDate>Fri, 28 Jan 2005 07:39:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467957#M66531</guid>
      <dc:creator>Uwe Zessin</dc:creator>
      <dc:date>2005-01-28T07:39:32Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467958#M66532</link>
      <description>Uwe, yes,&lt;BR /&gt;&lt;BR /&gt;As far as I know, they are the first programs that run, in PHYSICAL addressing mode, before virtual addressing is even set up. There task _IS_ setting up Virtual Memory, and then transfering control to the next image, which _DOES_ run in Virtual Memory.&lt;BR /&gt;&lt;BR /&gt;-- It was a loooooooong time since I had any class that touched this. If I mixed things up, I am sure John will step in with the correction.&lt;BR /&gt;&lt;BR /&gt;hth&lt;BR /&gt;&lt;BR /&gt;Proost.&lt;BR /&gt;&lt;BR /&gt;Have one on me.&lt;BR /&gt;&lt;BR /&gt;Jan</description>
      <pubDate>Fri, 28 Jan 2005 10:18:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467958#M66532</guid>
      <dc:creator>Jan van den Ende</dc:creator>
      <dc:date>2005-01-28T10:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: OpenVMS file shredder</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467959#M66533</link>
      <description>Brian.&lt;BR /&gt;&lt;BR /&gt;From my expiriance there are 2 basic steps you can take :&lt;BR /&gt;1. run and INIT/ERASE command on each volume. That will assure your data could not be restored in any "standart" way.&lt;BR /&gt;2. From my army expirience, there are several companies who can restore data even after a few low-level formats and writing over a new data. &lt;BR /&gt;The only way to overcome this is to have the magnetic plates inside the drives melted in fire (which we did in the army).&lt;BR /&gt;Since I can't think you want to get that far, just do an init/erase and that should do.&lt;BR /&gt;&lt;BR /&gt;Alon.</description>
      <pubDate>Sun, 30 Jan 2005 07:17:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/openvms-file-shredder/m-p/3467959#M66533</guid>
      <dc:creator>Alon Jacob</dc:creator>
      <dc:date>2005-01-30T07:17:13Z</dc:date>
    </item>
  </channel>
</rss>

