13.07.2015 Views

compilation-of-security-and-intelligence-principles

compilation-of-security-and-intelligence-principles

compilation-of-security-and-intelligence-principles

SHOW MORE
SHOW LESS
  • No tags were found...

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Hizb Tawheed Wal-Qitaalavoided while using such 'free' services. Some hotels <strong>and</strong>restaurants <strong>and</strong> many companies <strong>of</strong>fer free internet access,remember though, not to surf those nets without a VPN <strong>and</strong>/or Tor.• Keep private keys (pgp/gnu pgp) in a removable device, <strong>and</strong> thatremovable device MUST always be put far away from curious eyes.Encrypt the private key before doing this.• Keep VPN certs away from curious eyes via removable device, orcommon hidden folders. Never use the same users/passwords on reinstall. Take the time tocreate a new one each time. Use password generators. BE paranoid. All rare activity in your computer must be checked<strong>and</strong> monitored. That will provide 2 things: knowledge once youidentify it, <strong>and</strong> added safety.Securely Destroying Data:Unix/LinuxTo securely destroy data under *Nix you have some possibilities.The comm<strong>and</strong> shred -u overwrites singe files <strong>and</strong> deletes themfinally, with wipe -rcf you overwrite <strong>and</strong> delete directories. Becareful because the shredded/wiped data cannot be recovered.Open a Terminal <strong>and</strong> type;• shred -u • wipe -rcf If you feel the need to wipe the whole hard drive, the comm<strong>and</strong> isas follows for IDE-HDs (/dev/hda is the first HD)• wipe -kq /dev/hdaFor SATA <strong>and</strong> SCSI HDs you type (/dev/sda it‘s the first HD)• wipe -kq /dev/sdaIf wipe is not available to you, you can use dd. (again the first HD)• dd if=/dev/zero <strong>of</strong>=/dev/hda• dd if=/dev/ur<strong>and</strong>om <strong>of</strong>=/dev/hdaUse *both* comm<strong>and</strong>s, one after the other, if especially paranoid.Use them multiple times.The Compilation Of Security And Intelligence Principles Page 47

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!