Date: Wed, 18 Jul 2012 21:53:03 -0500 (CDT) From: Robert Bonomi <bonomi@mail.r-bonomi.com> To: bonomi@mail.r-bonomi.com, jhs@berklix.com Cc: freebsd-questions@freebsd.org, postmaster@freebsd.org Subject: Re: fsck on FAT32 filesystem? Message-ID: <201207190253.q6J2r3p0070058@mail.r-bonomi.com> In-Reply-To: <201207181558.q6IFwM7f033708@fire.js.berklix.net>
next in thread | previous in thread | raw e-mail | index | archive | help
> Date: Wed, 18 Jul 2012 17:58:22 +0200 > From: "Julian H. Stacey" <jhs@berklix.com> > Subject: Re: fsck on FAT32 filesystem? > > Hi Robert, cc questions@ cc postmaster@ (***) > > > What I am is an information systems professional with 45 years > > experience. > > Interesting reading that & your prior post. > 'Edge of the track, & turn up the op. amps' > has been an interesting technique for decades, I first read of it maybe > 70's or 80's ? I bet some, eg in government or private espionage, & > desperate incompetent bankers, & their employed service firms, probably > had fun seeing what was possible. (Envy ;-) All I'm going to say is: 1) There's a _reason_ the gov't requires hard drives with anthing higher than 'somewhat' classified data on them to be =physically= destroyed before leving the secure area. 2) As of 2007, 'over-writing' data (regardless of how many times) is *not* sufficient, any more, for _any_ military purposes.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201207190253.q6J2r3p0070058>