找回密码
 加入我们
搜索
      

[软件] 求推荐开源的硬盘擦除软件

[复制链接]
发表于 2023-5-8 13:27 | 显示全部楼层
这种用途的软件,就算两年不更新,难道还影响你用?
 楼主| 发表于 2023-5-8 13:30 | 显示全部楼层
小翻车鱼 发表于 2023-5-8 13:27
这种用途的软件,就算两年不更新,难道还影响你用?


界面有bug,某些选项显示不全
发表于 2023-5-8 13:42 | 显示全部楼层
一开始就用bitlocker锁全盘,后面随便格式化几次就够了吧
 楼主| 发表于 2023-5-8 13:54 | 显示全部楼层
纨绔弟子 发表于 2023-5-8 13:42
一开始就用bitlocker锁全盘,后面随便格式化几次就够了吧

锁之后的文件很安全,前提是bitlocker没后门或漏洞,锁之前被覆盖的未加密文件,磁力显微镜可以恢复部分
发表于 2023-5-8 14:21 | 显示全部楼层
沙悟净@蓝领 发表于 2023-5-8 12:30
可以恢复的,就算写入几十次相关标准公式生成随机数据,用磁力显微镜也能恢复部分数据,所以现在美国新标 ...

太牛了。写几十次都可以恢复。。。

才卖掉自己的几个硬盘。。。好怕

不过买家也不至于这么闲吧。。。
 楼主| 发表于 2023-5-8 14:33 | 显示全部楼层
kaixin_chh 发表于 2023-5-8 14:21
太牛了。写几十次都可以恢复。。。

才卖掉自己的几个硬盘。。。好怕


不是特别重要的数据,用Eraser中的DOD 3passes写入3次就可以了,卖家有磁力显微镜当我没说

重要的数据,大锤伺候,锤烂后盘片用打火机烤烤
发表于 2023-5-8 14:33 | 显示全部楼层
你是何等涉密级别,对 物理开盘破坏 还不放心?
发表于 2023-5-8 14:57 | 显示全部楼层
kaixin_chh 发表于 2023-5-8 00:54
直接存入别的不重要数据不就行了

哪还有技术恢复之前的数据

据传说,最多可以回复出覆盖8次的数据,当然也不是全部,只是部分。
关键是,民用东西,谁会吃饱了撑的花大价钱去恢复?就为了看点别人的小电影?
发表于 2023-5-8 15:37 | 显示全部楼层
打开拿强磁力炫一圈就结束了
发表于 2023-5-8 15:50 | 显示全部楼层
沙悟净@蓝领 发表于 2023-5-8 12:30
可以恢复的,就算写入几十次相关标准公式生成随机数据,用磁力显微镜也能恢复部分数据,所以现在美国新标 ...

固态和普通硬盘都一样吗?
 楼主| 发表于 2023-5-8 16:22 | 显示全部楼层
ycc1219 发表于 2023-5-8 14:57
据传说,最多可以回复出覆盖8次的数据,当然也不是全部,只是部分。
关键是,民用东西,谁会吃饱了撑的花 ...

磁力显微镜可以恢复古特曼标准生成的随机数据覆盖35次
 楼主| 发表于 2023-5-8 16:25 | 显示全部楼层
ric 发表于 2023-5-8 15:50
固态和普通硬盘都一样吗?

固态单文件覆盖无效,因为均衡写入机制,每次写入都是不同的位置,全盘覆盖有效,但据说可以恢复部分文件。
建议拆开把闪存芯片砸碎最保险
发表于 2023-5-8 20:32 | 显示全部楼层
沙悟净@蓝领 发表于 2023-5-8 16:22
磁力显微镜可以恢复古特曼标准生成的随机数据覆盖35次


Peter Gutmann講覆寫35次,已是1996年的事情。

他自己後來澄清說,文章不是建議要覆寫35次,而且後來新的硬盤碟片密度高,並採用了不同的編碼方式,所以文章內容已不再合時宜。

https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
Peter Gutmann 在後記(Epilogue)寫:
"In the time since this paper was published, some people have treated the 35-pass overwrite technique described in it more as a kind of voodoo incantation to banish evil spirits than the result of a technical analysis of drive encoding techniques. As a result, they advocate applying the voodoo to PRML and EPRML drives even though it will have no more effect than a simple scrubbing with random data. In fact performing the full 35-pass overwrite is pointless for any drive since it targets a blend of scenarios involving all types of (normally-used) encoding technology, which covers everything back to 30+-year-old MFM methods (if you don't understand that statement, re-read the paper). If you're using a drive which uses encoding technology X, you only need to perform the passes specific to X, and you never need to perform all 35 passes..."

"...Looking at this from the other point of view, with the ever-increasing data density on disk platters and a corresponding reduction in feature size and use of exotic techniques to record data on the medium, it's unlikely that anything can be recovered from any recent drive except perhaps a single level via basic error-cancelling techniques. In particular the drives in use at the time that this paper was originally written are long since extinct, so the methods that applied specifically to the older, lower-density technology don't apply any more. Conversely, with modern high-density drives, even if you've got 10KB of sensitive data on a drive and can't erase it with 100% certainty, the chances of an adversary being able to find the erased traces of that 10KB in 200GB of other erased traces are close to zero."

後後記(Further Epilogue)寫:
"...Any modern drive will most likely be a hopeless task, what with ultra-high densities and use of perpendicular recording I don't see how MFM would even get a usable image, and then the use of EPRML will mean that even if you could magically transfer some sort of image into a file, the ability to decode that to recover the original data would be quite challenging."
发表于 2023-5-8 20:33 | 显示全部楼层
kaixin_chh 发表于 2023-5-8 14:21
太牛了。写几十次都可以恢复。。。

才卖掉自己的几个硬盘。。。好怕

不用怕,現今高密度碟片的硬盤,即使動用實驗室技術,只要以正確方法,例如用hdparm以硬盤內建的ATA Secure Erase指令,全盤覆寫一次就已恢復不了。
发表于 2023-5-8 20:43 | 显示全部楼层
hhoen 发表于 2023-5-8 20:32
Peter Gutmann講覆寫35次,已是1996年的事情。

他自己後來澄清說,文章不是建議要覆寫35次,而且後來新 ...

严谨,牛啤
 楼主| 发表于 2023-5-8 21:24 | 显示全部楼层
hhoen 发表于 2023-5-8 20:33
不用怕,現今高密度碟片的硬盤,即使動用實驗室技術,只要以正確方法,例如用hdparm以硬盤內建的ATA Secu ...

https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

Recommendations
There are two ways that you can delete data from magnetic media, using software or by physically destroying the media. For the software-only option, to delete individual files under Windows I use Eraser and under Linux I use shred, which is included in the GNU coreutils and is therefore in pretty much every Linux distro. To erase entire drives I use DBAN, which allows you to create a bootable CD/DVD running a stripped-down Linux kernel from which you can erase pretty much any media. All of these applications are free and open-source/GPLed, there's no need to pay for commercial equivalents when you've got these available, and they're as good as or better than many commercial apps that I've seen. To erase SSDs.... well, you're on your own there.
For the physical-destruction option there's only one product available (unless you want to spend a fortune on something like a hammer mill), but fortunately it's both well-designed and inexpensive. DiskStroyer is a set of hardware tools that lets you both magnetically and physically destroy data on hard drives, leaving behind nothing more than polished metal platters. It's been carefully thought out and put together, there's everything you need included, down to safety glasses for when you're disassembling the drive. It's had very positive reviews from its users. If you really want to make sure that your data's gone, this one gets my thumbs-up (and this isn't a paid endorsement, if only other technical products had this level of thought put into the workflow and usability aspects).

有两种方法可以从磁性介质中删除数据,使用软件或通过物理方式销毁介质。对于纯软件的选择,在Windows下删除单个文件,我使用Eraser,在Linux下我使用shred,它包含在GNU coreutils中,因此在几乎所有的Linux发行版中都有。要删除整个驱动器,我使用DBAN,它允许你创建一个可启动的CD/DVD,运行一个精简的Linux内核,你可以从中删除几乎所有的媒体。所有这些应用程序都是免费的,并且是开源/GPLed的,当你有这些可用的应用程序时,没有必要为商业等价物付费,而且它们和我所看到的许多商业应用程序一样好,甚至更好。要擦除SSDs....,你就得靠自己了。
对于物理破坏的选择,只有一种产品可用(除非你想花大价钱买锤子磨之类的东西),但幸运的是,它既设计良好又便宜。DiskStroyer是一套硬件工具,可以让你以磁力和物理方式销毁硬盘上的数据,只留下抛光的金属盘。它是经过仔细考虑和组装的,包括你所需要的一切,甚至包括你在拆卸硬盘时的安全眼镜。用户对它有非常积极的评价。如果你真的想确保你的数据消失,这个产品会让我竖起大拇指(这不是一个有偿代言,如果其他技术产品在工作流程和可用性方面有这样的考虑就好了)。
发表于 2023-5-8 21:26 | 显示全部楼层
hdtune不就有写0吗
发表于 2023-5-8 21:29 | 显示全部楼层
本帖最后由 hhoen 于 2023-5-8 21:51 编辑
沙悟净@蓝领 发表于 2023-5-8 12:30
可以恢复的,就算写入几十次相关标准公式生成随机数据,用磁力显微镜也能恢复部分数据,所以现在美国新标 ...


根據美國國家標準技術研究所(NIST) 2014 Special Publication 800-88 Rev. 1, Guidelines for Media Sanitization,全盤覆寫零一次,亦無需隨機數據,就已經恢復不了:
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-88r1.pdf
Section 2.4 (第七頁):
"For storage devices containing magnetic media, a single overwrite pass with a fixed pattern such as binary zeros typically hinders recovery of data even if state of the art laboratory techniques are applied to attempt to retrieve the data."

最佳方法是以硬盤內建的指令擦除, 而不是用戶自己寫入數據:
"One major drawback of relying solely upon the native Read and Write interface for performing the overwrite procedure is that areas not currently mapped to active Logical Block Addressing (LBA) addresses (e.g., defect areas and currently unallocated space) are not addressed. Dedicated sanitize commands support addressing these areas more effectively."

Tutorial on Disk Drive Data Sanitization (University of California, San Diego Center for Magnetic Recording Research) 第八頁寫,在CMRR測試覆寫硬盤多次,發現並沒有造成更多的擦除後,美國NSA准許使用單一次硬盤Secure Erase覆寫:
https://cmrr.ucsd.edu/_files/data-sanitization-tutorial.pdf
"Secure erase does a single on-track erasure of the data on the disk drive. The U.S. National Security Agency published an Information Assurance Approval of single pass overwrite, after technical testing at CMRR showed that multiple on-track overwrite passes gave no additional erasure."

 楼主| 发表于 2023-5-8 21:34 | 显示全部楼层
hhoen 发表于 2023-5-8 20:33
不用怕,現今高密度碟片的硬盤,即使動用實驗室技術,只要以正確方法,例如用hdparm以硬盤內建的ATA Secu ...


一次全盘写0或写1,是可以通过剩磁效应恢复的
 楼主| 发表于 2023-5-8 21:36 | 显示全部楼层
hhoen 发表于 2023-5-8 21:29
根據美國國家標準技術研究所(NIST) 2014 Special Publication 800-88 Rev. 1, Guidelines for Media Sani ...

有使用硬盘内建的指令擦除的软体么,想下一个
发表于 2023-5-8 21:58 | 显示全部楼层
沙悟净@蓝领 发表于 2023-5-8 21:36
有使用硬盘内建的指令擦除的软体么,想下一个

開源的hdparm (Linux):
https://sourceforge.net/projects/hdparm/

hdparm Secure Erase使用方法:
https://tinyapps.org/docs/wipe_drives_hdparm.html
发表于 2023-5-8 22:00 | 显示全部楼层
有的主板bios里面就有这个功能。
 楼主| 发表于 2023-5-8 22:02 | 显示全部楼层
hhoen 发表于 2023-5-8 21:58
開源的hdparm (Linux):
https://sourceforge.net/projects/hdparm/

请问Windows下有没有硬盘内建的指令擦除的软体么?
发表于 2023-5-9 01:34 | 显示全部楼层
想让文件不可恢复,读写当时打开文件,用随机内容覆盖保存就行。
图安心那就写满全盘。
有坏道盘都不想要了那直接打锤子砸,磁铁吸,扔水里,更省事。

至于覆盖一遍两遍能拿磁力显微镜根据相邻磁道去判断找回,我觉得(若有实锤证据欢迎反驳),那可能是很多年前硬盘厂商的磁头定位技术还不够高,碟道密度还不够高时的情况,但后来机械硬盘单碟容量越来越高,应该是不可行了,真要有那么高保密要求拿大锤子砸了磁铁吸了泡水,还能怎么恢复。

这种重写的所谓擦除没啥技术含量,早就有不少这种软件了,一些管家类软件也内置,新写个这种软件没啥意义吧
发表于 2023-5-9 11:04 | 显示全部楼层
沙悟净@蓝领 发表于 2023-5-8 13:54
锁之后的文件很安全,前提是bitlocker没后门或漏洞,锁之前被覆盖的未加密文件,磁力显微镜可以恢复部分 ...

所以我说一开始就用就锁上,我的电脑几个盘全是开BitLocker的,这东西真不太好解开,可以看看之前有一篇说BitLocker解密的,也是有原主机才行
发表于 2023-5-9 12:14 | 显示全部楼层
找有3A资质的供应商消磁,全程在监控下,双人以上操作和实施,然后要求供应商提供该盘的消磁证书
完了盘片拆出来,用砂纸再打磨一次,盘片折成四分之一,穿孔,编号,并记录存放到保险柜里
保险柜安放在带有门禁和监控的封闭室内
发表于 2023-5-9 13:31 | 显示全部楼层
沙悟净@蓝领 发表于 2023-5-8 22:02
请问Windows下有没有硬盘内建的指令擦除的软体么?

硬盤廠商自己的工具,例如Western Digital Dashboard:
https://support-en.wd.com/app/answers/detailweb/a_id/50650

Seagate的SeaTools 好像也可以
https://www.seagate.com/content/dam/seagate/migrated-assets/www-content/support-content/downloads/seatools/_shared/downloads/100869623_B.pdf
发表于 2023-5-9 14:04 | 显示全部楼层
windie 发表于 2023-5-8 09:23
这种软件擦除后有能生成pdf报告的么?

有,收费的
我们公司外企,电脑报废是总部指定的回收商,他们用的软件是Blancco Drive Eraser
发表于 2023-6-11 13:49 | 显示全部楼层
盘拆了  片片拿出来  杂碎很快的  剩下的电机还能做点啥
发表于 2023-6-11 13:54 | 显示全部楼层
报废的就拆开,盘片当杯垫。
您需要登录后才可以回帖 登录 | 加入我们

本版积分规则

Archiver|手机版|小黑屋|Chiphell ( 沪ICP备12027953号-5 )沪公网备310112100042806 上海市互联网违法与不良信息举报中心

GMT+8, 2025-2-4 08:41 , Processed in 0.014110 second(s), 5 queries , Gzip On, Redis On.

Powered by Discuz! X3.5 Licensed

© 2007-2024 Chiphell.com All rights reserved.

快速回复 返回顶部 返回列表