mailing list archives
Re: Disk wiping -- An alternate approach?
From: Bipin Gautam <bipin.gautam () gmail com>
Date: Wed, 27 Jan 2010 22:03:37 +0545
Really? How much do you know of computer forensics? Care to Double
clicked a few forensic tools first............
I bring up this issue here because as you can see the laws are
different in different country and at places just "possession" of a
questionable content is a crime, without much analysis from where did
it come from. Such a logic doesnt hold much water from a technical
prospective, that is what i was trying to discuss. (but you were so
much concerned about my english lol )
We were talking on a NEW topic, But if truecrypt is all you know, then
download truecrypt and add a "custom cascade of ciphers" to your
truecrypt source code... so that your truecrypt hidden volume will be
very hard to bruteforced with off the self tools (which is what most
forensic examiners do, they are tool dependent).....
(i wish to make fun of you, but maybe another email! ;)
On 1/27/10, T Biehn <tbiehn () gmail com> wrote:
You made the argument against youself; apparently you didn't comprehend the
points made in 90% of the on-topic responces to this thread.
On Jan 27, 2010 9:34 AM, "Bipin Gautam" <bipin.gautam () gmail com> wrote:
McGhee & T Biehn !
Thankyou for putting up your "best" argument.... sadly that is the
BEST technical thing you happen to pick............. in this topic to
On 1/27/10, McGhee, Eddie <Eddie.McGhee () ncr com> wrote: > and also lol @
maybe USELESS, try making ...
<bipin.gautam () gmail com<mailto:bipin.gautam () gmail com>> wrote: > > Enough
noise, Lets wrap up: > >...
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/