SHRED(1) FSF SHRED(1)
shred - delete a file securely, first overwriting it to
hide its contents
shred [OPTIONS] FILE [...]
CAUTION: Note that shred relies on a very important
assumption: that the filesystem overwrites data in place.
This is the traditional way to do things, but many modern
filesystem designs do not satisfy this assumption. The
following are examples of filesystems on which shred is
* log-structured or journaled filesystems, such as those
AIX and Solaris (and JFS, ReiserFS, XFS, etc.)
On Mon, Sep 30, 2002 at 03:10:13PM -0400, Scott McDermott wrote:
> Chris Wedgwood on Mon 30/09 11:56 -0700:
> > That said, if you are *really* paranoid deleting and over-writing the
> > data doesn't suffice unless done carefully and eve nthen there are
> > caveats.
> Just use shred(1)...it's from fileutils so it should be on any GNU box.
> You also have to worry about VM pages being written to swap unencrypted.
> Encrypted loopback is probably better for this application.
Ray Muno http://www.aem.umn.edu/people/staff/muno
University of Minnesota e-mail: muno@xxxxxxxxxxx
Aerospace Engineering and Mechanics Phone: (612) 625-9531
110 Union St. S.E. FAX: (612) 626-1558
Minneapolis, Mn 55455