[ale] destroy old drives

Jim Kinney jim.kinney at gmail.com
Thu Apr 11 22:10:05 EDT 2019


I think a drive destruction by log splitter demo would get quite a crowd!!

On April 11, 2019 9:37:11 PM EDT, William Bagwell <rb211 at tds.net> wrote:
>Layer of soft porn between the encrypted stuff and the red herring
>files will 
>add to their frustration;-)
>
>Years ago bought a used 10 GB HD at the computer show in Marietta that
>was 
>from a banks computer. No account info (that I could find) but there
>was an 
>interesting inter-office memo describing the protocol to follow during
>a 
>robbery. Son wanted to save it but it was formated and used in a
>firewall 
>for almost a decade. HD still running when firewall retired...
>
>Oh, if I ever start attending meetings again should I bring my log
>splitter?
>
>William
>
>On Thursday 11 April 2019, Jim Kinney via Ale wrote:
>> I like to write clear text red herring files onto a LUKS encrypted
>drive
>> to be disposed of. So delete the LUKS header, overwrite it with
>> /dev/random. Reformat the drive as fat32 then add:
>>
>> Files named "bank_codes" and then filled with random generated
>account
>> numbers and passwords. Files named "my passwords" and filled with
>random
>> usernames, accounts, and passwords" Files named "my new access list"
>> filled with real usernames gleaned from facebook, google, etc. but
>random
>> passwords
>>
>> This works real well on a fresh install win10 with no password on the
>> default user account. Keeps the schmucks busy testing :-)

-- 
Sent from my Android device with K-9 Mail. All tyopes are thumb related and reflect authenticity.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mail.ale.org/pipermail/ale/attachments/20190411/f74f0d3a/attachment.html>


More information about the Ale mailing list