Home page logo

fulldisclosure logo Full Disclosure mailing list archives

Re: Gutmann's research paper today
From: Bipin Gautam <gautam.bipin () gmail com>
Date: Wed, 8 Feb 2006 23:48:24 +0545

but guys the old 'Gutmann's research paper' doesn't properly clearify
a PRACTICAL way to sanatise the RAM. Ya ofcource, without physically
destroying it.

(anyone? who good idea on this topic???)

say; i have to sanatize my 512mb RAM. Which would be more better to
implement in immidiate emergency?

a). within the next 5 minutes completely overwrite my RAM (say) 5 x 60
= 300 times with a bootable media after reboot.
b). With a bootable media after reboot do some complete random wipes
first. Hold the memory like that for next 10 minutes and repeat this
same process several times.

Feel free to point me to some kernel modules (if any?) that can be
used to transperently encrypt the I/O of RAM once system boots up and
basic drivers are loded.

I need some recomendations on 'proper' RAM sanitization!
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]