Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- It goes without saying this is a destructive process. Targeting the right device is critical, and the data will be irretrievable.
- Do not attempt this with a USB disk (not that I've tried, but that's what I've read)
- The purpose of a full security wipe vs just a shred (though I'll generally do them both) is that this should also wipe reallocated sectors for that obscure case where you sell a drive on ebay and the one reallocated sector has your banking information in it...
- The disk will appear 'dead' during this process (at least on my controller) and disk query commands against that device could time out or hang. If you're using Veeam or something that's likely to try to access the device during it's extended wipe window you might want to disable that job for the duration of the wipe.
- You can use any password you like. I'm not aware that a more complex password results in a better wipe, and it's removed upon successful erasure.
- The commands (and selected output) to use at your own risk:
- hdparm --user-master u --security-mode m --security-set-pass Drei /dev/sdc security_password="Drei"
- /dev/sdc:
- Issuing SECURITY_SET_PASS command, password="Drei", user=user, mode=max
- time hdparm --user-master u --security-erase-enhanced Drei /dev/sdc security_password="Drei"
- /dev/sdc:
- Issuing SECURITY_ERASE command, password="Drei", user=user
- (hdparm -I /dev/sdc would tell you how long thats going to take and if it's even supported)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement