Jump to content

NIM

Administrator
  • Posts

    4,117
  • Joined

  • Last visited

  • Days Won

    75

Everything posted by NIM

  1. FORMAT.COM is an external MS-DOS command, located by default in C:\Windows\Command Hidden Parameter : Hidden parameter are not documented by Microsoft and is find by users threw experiments. 1) FORMAT /AUTOTEST : FORMAT /AUTOTEST checks for the existing format of your disk, unless the /U (UNCONDITIONAL) parameter is also used, and then proceeds with an UNATTENDED DISK(ETTE) FORMAT: DOES NOT prompt for a volume label! DOES NOT prompt to format another disk(ette)! NO delay: NO user intervention! Ends WITHOUT pausing! After completion, it DOES display disk space statistics. 2)FORMAT drive: /U : FORMAT drive: /U performs an UNCONDITIONAL format, which DESTROYS every byte of data on ANY hard disk/floppy by overwriting it with zeroes (hex F6h). 3) FORMAT drive: /SELECT /U : FORMAT drive: /SELECT /U makes a disk(ette) UNREADABLE by filling the system area (sector 0) with zeroes (hex F6h), due to using these two incompatible options together. All other sectors are left intact.. From: http://antionline.com/archive/index.php/t-235813.html Interesting is that every link from this page isn't working, but in this 1`st QUOTE there are 2 working links..... -------------------------------------------------------------------------------------------------------------------- There are "de-magnetisers" machines (degausser) that are used for disabling drives that have contained top-secret data, and these cost a bundle. However, only using software, you can only have the drive read or write data. The drive heads cannot just "scatter magnetic charges"... how would a head that is designed to read and write individual bits (in block), ie precisely, be able to do that?. Besides, if it were the case, the drive would either need a low level format after that or be filled with bad clusters, ie: be just plain dead. Here's an extract of DoD 5220.22-M shredding guidlines: http://www.killdisk.com/dod.htm chapter8 a. Degauss with a Type I degausser b. Degauss with a Type II degausser. c. Overwrite all addressable locations with a single character. d. Overwrite all addressable locations with a character, its complement, then a random character and verify. THIS METHOD IS NOT APPROVED FOR SANITIZING MEDIA THAT CONTAINS TOP SECRET INFORMATION. Also, a comparaison of software "shredders" can be found here: http://www.sdean12.org/Comparison_Shredders.htm (Check the "Overwrite algorithm" row for wiping technique) -------------------------------------------------------------------------------------------------------------------- Well, no, IT IS possible: Overwriting data on disk isn't like filling a closet, it's like writing over used paper... What happens is that when the disk heads write on the platter, it re-aligns magnetite (or whatever magnetic compound they use) in a diffrent direction. However, a single write doesn't manage to get all magnetite (or whatever) particuls re-alligned. So while the majority of particuls will have change directions, there will be a few residual ones that will still be oriented in the previous direction. So finding out what data was there before means using a more sensible device that can distinguish or detect variations in the magnetic field or such... (That's why whiping software will make multiple writing passes, sometimes with randomized caracter, in order to try and re-allign all particuls). Of course this is hard to do and pretty expensive, but people with enough money and resources (think FBI, CIA, NSA...) could and do have the means to do it. In fact, I remember reading somewhere that it was rumored the NSA (I think) was able to recover data after 27 passes! -------------------------------------------------------------------------------------------------------------------- When data is written to magnetic media it is written to a magnetic domain. This domain consists of a number of magnetic bits (not to be confused with a data bit 0 or 1) which receive the magnetic charge. Not all of the bits in the magnetic domain will change when the head passes over during the write operation and will retain the magnetic properties from a previous operation. Does this mean that a magnetic domain can contain magnetic bits that are set to a zero and magnetic bits that are set to a one? It certainly does, but if the write operation was setting the bit to a one then the majority are set to a one, strongest at the center of the domain weaker at the edges. Remember in grade school when you put metal filings on a piece of paper and ran a magnet underneath. Most of the filings lined up and pointed in the same direction, but the ones at the edges didn't all point with the others. The same thing is happening when you write to the hard disk. Is it easy to peel back these layers to determine what was overwritten? With modern hard disks this is a difficult, costly, and time consuming process but portions of overwritten data can be recovered if it was overwritten or wiped with a single pass process. The minimum process that should be involved in a wipe would be a three pass write. A three pass will make one pass writing 00 followed by it's complement which is an FF and a final pass of random data. It is still possible to recover some data after a 3 pass wipe, but whoever does will want that data very badly and have the $$ to attempt the recovery. Generally a 7 pass wipe will make it near impossible to recover the data and I have never heard of any data being recovered after a Guttman 35 pass wipe. (Disclaimer.. Doesn't mean that those agencies with 3 letter names can't do it but they would really want you bad to go to the expense involved) -------------------------------------------------------------------------------------------------------------------- Awesome tools: DBAN: Darik's Boot and Nuke: (free) Darik's Boot and Nuke ("DBAN") is a self-contained boot floppy that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction. DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of hard disk forensic analysis. Download Eraser: (free) Eraser is an advanced security tool (for Windows), which allows you to completely remove sensitive data from your hard drive by overwriting it several times with carefully selected patterns. Works with Windows 95, 98, ME, NT, 2000, XP, Windows 2003 Server and DOS. Eraser is Free software and its source code is released under GNU General Public License. The patterns used for overwriting are based on Peter Gutmann's paper "Secure Deletion of Data from Magnetic and Solid-State Memory" and they are selected to effectively remove magnetic remnants from the hard drive. Other methods include the one defined in the National Industrial Security Program Operating Manual of the US Department of Defence and overwriting with pseudorandom data. You can also define your own overwriting method Download
  2. No, you don't have to reinstall windows. Just remove all of the codec drivers you have and install just one codec pack. Looks like two or more codecs are interfering here..
  3. I was on Vista presentation few weeks ago where they said that Vista can better handle with BSOD. In 80% of the cases Vista "knows" how to avoid BSOD. You said you were watching a movie, if you watched an .avi or some other format, you probably have a codec issue here.
  4. Try this.. Remove all of installed codecs from the system. Use attached codec pack and make a full install when prompted. Hope it helps.
  5. Unfortunately the ability to access Yahoo! Mail via a POP3 email client (such as Outlook, Outlook Express or Windows Mail) is only available to customers of premium Yahoo! Mail Plus service. If you have not purchased the Yahoo! Mail Plus service, you will be unable to retrieve messages via an email client. TBH, I don't know how much do they charge for that service..
  6. Windows Mail is the successor of Outlook Express 6. You should know POP and SMTP addresses to setup Windows Mail. POP3 or Post Office Protocol 3 is often used by this address pop.%domain%.com POP3 servers hold incoming e‑mail messages until you check your e‑mail, at which point they're transferred to your computer. POP3 is the most common account type for personal e‑mail. Messages are typically deleted from the server when you check your e‑mail. SMTP or Simple Mail Transfer Protocol is often used by this address mail.%domain%.com SMTP servers handle the sending of your e‑mail messages to the Internet. The SMTP server handles outgoing e‑mail, and is used in conjunction with a POP3 or IMAP incoming e‑mail server. Please post which internet mail would you like to setup in Windows Mail, and I'll test it and will give you complete "how to" for the mail account you'll specify..
  7. Vista is more secure OS than XP, so I presume it could be a firewall. Try to configure Vista's firewall or even disable it so you can see if the problem will be solved in this way..
  8. I haven't tried it yet mate, maybe Kels could help on this issue..
  9. Start here mate.. http://www.adobe.com/cfusion/knowledgebase...x.cfm?id=330089 if this won't help, let me know..
  10. You have problems with registry permissions for sure, 'cause you had similiar problem with the flash.. Hmm, I'll check it out and let you know if I find a solution for this issue..
  11. I'm sure that the problem is in registry permissions. Are you administrator on that PC?
  12. On the Windows 2003 Server, open the registry and verify whether settings below exist. If not, please add them accordingly. The attached text file can be renamed (RPC.REG) and can be merged into the registry automatically, or you can download and run attached file. [HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Rpc\Internet] "PortsInternetAvailable"="N" "UseInternetPorts"="N" Hope it helps.. rpc.reg
  13. Hmm, you should see it, if not, you probably don't have required permissions for the file. Are you local admin on that PC? Have you tried attached file that I posted above in the second post? Glad it worked, Vista has a lot of issues regarding software and security compatibility. The main problem is that even though you're an Admin on your PC, you have similiar rights as a user.
  14. Yeah, my fault, I've obviously neglected the topic title :boo: ..
  15. Try this: Navigate to C:\Windows\System32\Macromed\Flash Then right-click over both 'Flash9b.ocx' and 'FlashUtil9b.exe', and choose Properties. In Properties choose the "Security" tab. Click on the "Everyone" account (or add it if it isn't there), and the button called "Edit" and then check the box called "Full Control", click "Apply" and do the same with your own Windows local account name. Once you have done this for both files, run the FlashUtil9b.exe and it should install and update and tell you to restart. Do so and you should now find that YouTube and other sites that use Flash now work. Also few guidelines:
  16. Doh :doh: you're using Vista. I'll try to search for a solution..
  17. Well, we should pin nLite manual, not this mate
  18. Yeah, I'm sure it's related with registry, 'cause required registry key isn't saved after the restart..
  19. Please refrain from insulting other members, cygnus didn't mean to offend you with his question.
  20. Avast is very good IMHO, but I never used Windows Defender, but guessing it's alright too. The best antispy app that I've tried was Spyware Doctor. It can found spyware that adaware and spybot will pass.. Try to scan with it..
×
×
  • Create New...