home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Gold Medal Software 3
/
Gold Medal Software - Volume 3 (Gold Medal) (1994).iso
/
utils2
/
oblit14.arj
/
OBLIT.DOC
< prev
next >
Wrap
Text File
|
1994-04-11
|
12KB
|
244 lines
OBLIT.DOC - v1.4
(C)1993,94 Tolgathian Software
OVERVIEW
Hello!
This program is for you security minded people out there,
especially those using encryption. It will completely and
irretrievably destroy the contents of ANY file. It then
deletes it for good measure.
Just in case you did not know this, when you delete a file, like
the plain text of a message you just encrypted, all MS-DOS does is
remove it from the File Allocation Table. The file is still there,
but it is just removed from the MS-DOS "do not use this space" list.
It can easily be undeleted with the DOS command UNDELETE. If someone
was to undelete a file after you have used OBLIT on it, however, it
will be completely full of garbage when they try and look at it.
Even sophisticated magnetic signature equipment will have a hard
time reconstructing the file, because OBLIT writes over the file
with three patterns five times each. This is a total of fifteen
writes. Good luck to the snoop.
IMPORTANT NOTES ON SECURITY
Something you need to be aware of is that many (if not all)
word processors and text editors make "backup" copies of the document
you are working on. These files normally have a BAK extension to
the file. Make sure that if you are trying to OBLIT a file that
you OBLIT other copies of it as well! For example, suppose I have
a file called PERSONAL.TXT and I edit it with my favorite text
editor. Every time I do so, the editor makes a PERSONAL.BAK copy of
the file. If I decide to OBLIT the file PERSONAL.TXT, I must also
OBLIT the file PERSONAL.BAK, otherwise someone could read it.
A simple way to look for multiple copies of a file in a directory
is to do a DIR command on the file, without the extension:
DIR PERSONAL will reveal the files PERSONAL.TXT, PERSONAL.BAK,
and PERSONAL.DOC. You can also specify any extension by using
a * wilcard. DIR PERSONAL.* will reveal the same files above.
Another word about word processors. Many of them make periodic
saves to a temporary file while you are editing. This way, if
power fails in the middle of what you are doing, the program can
reconstruct your document up to the last time it saved it. This
is not good for security. The program does not use your filename,
it uses a randomly generated or preset one. If at all possible,
TURN THIS FEATURE OFF WHEN EDITING SENSITIVE INFORMATION!!
Otherwise, you can OBLIT and encrypt everything in sight, but a
snoop only has to "undelete" the temporary file(s) they find
and read them instead. If you can not turn this off, find out
from the manual or the manufacturer what the temporary filename
is. When you are through editing, exit the program, use the
MS-DOS undelete function to bring it back, and then OBLIT it.
I would recommend using a plain vanilla text-editor and not a
word processor for sensitive text. They tend to not outsmart you
and are very straight forward. Usually they only make *.BAK copies
of your work, and who needs Times Roman 24 point fonts in
confidential information anyway?
One of the keys to good security is Keep It Simple Stupid.
The only thing that needs to be complicated is an encryption
algorithm, and usually the simpler ones of these are the best.
The simpler things are, the easier they are to control.
For the utmost in security, a good encryption program will lock
up your data from intruders and snoops. Depending on the stuff
you are trying to hide, you need to be sure the encryption is
strong against a concerted cryptanalytic attack. Unfortunately,
most commercial software is either weak because the programmer is
not well versed in cryptography, or it is based on a U.S. Government
encryption standard called DES. The Government does not rely on
the DES for military applications. This should warn you that if
you are trying to hide from them that you should NOT use this
kind of encryption. One of the best programs for encryption is
Pretty Good Privacy (PGP). It is currently sold by a company called
ViaCrypt. This program was originally written by Phil Zimmerman.
He included a very good overview of encryption and security. I am
not sure that ViaCrypt has kept this little treatise with the program
or not. You may still be able to find PGP on many BBS systems.
I highly recomend reading his documentation if you can find it.
If you really need to be extra cautious, you might need to
purchase a bulk degausser. These are basically large AC electro-
magnets. By moving the floppy disk (or hard disk) through their
very powerfull magnetic field, you effectively erase everything
all at once. Or, if you don't mind losing floppies, you could simply
burn or shred them instead. If you choose to shred anything, make
sure that it is a Cross-Cut shredder that makes pieces under 1/16th
of an inch at the largest (prefferably 1/32nd), and after each
shredded item you should feed through a "blank" item. Hard drives
are harder to destroy, so a degausser is your best bet.
I would still OBLIT things first.
= Legalus Stayvus Offus ad Juris Nauseum =
Tolgathian Software hereby places this program and it's related
documentation into the Public Domain as long as this document file
remains with it and both remain unaltered. It may be archived and
freely distributed across, through and in any medium. It may be
distributed by commercial operations as long as no charge is made
for the software - only a reasonable medium/processing charge may
apply. Tolgathian Software and anyone related to it (i.e.: it's
employees, members, and owners) provide this software as is, and
no guarantee is made for it's proper operation and fitness for any
purpose. The user understands and agrees that the user will not
hold Tolgathian Software, it's employees, members, or owners
responsible for any direct, incidental, related, consequential,
or otherwise remotely conceived or connected damages as the result
of it's use or misuse. Because of the nature of computers in general
and the power/resources wielded by large corporations and the
government in particular, the user understands that no guarantee
is made that this program will protect information from disclosure.
The only real secret is the one that only you know.
Sorry to bore you with that stuff, but good heavens! People will
sue the Mayor if they fall and hurt themselves while doing a
handstand on a skateboard going downhill on a gravel sidewalk
backwards with no helmet at rush-hour blindfolded. And some fool
lawyer that should know better will help them do it!
("Doctor! It hurts when I do this!" "Well, don't do it."
"You Quack! I'm gonna sue you from here 'til Sunday!")
= Internalus Workus =
This is how it works. OBLIT looks at the file and sees how many
bytes long it is. It then writes three different byte-long bit
patterns over each byte in the file, for the length of the file.
These patterns are:
11111111
00000000
<random>
It does this same operation 5 times, just to make sure that any
latent magnetic signature of the original file is destroyed as
far as possible. With each pass, a different psuedo-random byte
is written. The random number generator is re-seeded with each
pass. (The seed is based on the clock ticks inside your machine.)
As you can see, the last pattern is all random. This is what the
file is left containing before being deleted.
Be sure that you want to destroy the file before you do so, as
unlike a simple MS-DOS delete, there is NO way for you to bring
this file back from an OBLIT. It is gone. Period.
INSTALLATION
Copy the OBLIT.COM file from wherever it is now to one of the
directories in your PATH. Some people put utilities in their
DOS directory, others (like me) put them in a UTILS directory.
If the program is in your PATH, you will be able to use it from
anywhere.
If this is all strange to you and you do not know what I am
talking about, try this: Suppose the program OBLIT.COM is on a
disk in the A: drive. Suppose you want to copy it to your C:
drive, to a directory called DOS. This is what you would type
at any DOS prompt:
COPY A:\OBLIT.COM C:\DOS
This should do the trick. Still stuck? Ask a friend or read the
DOS manual where it talks about directories and such.
I originally wrote OBLIT without software and hardware caches in
mind. After testing on a friend's and on my new machine, I noticed
that some caches and some cahce settings will prevent the repeated
writing over of the file on the drive. The file still gets OBLITed,
but I do not think it destroys the magnetic signature enough.
The writes will take place in the cache until the cache determines
that access to the file is done. For this reason, I have built a
two second delay into each write, thus hopefully fooling the cache
into writing to disk. It works here with a Promise Technology cacheing
controller, both with and without the cache delayed write enabled,
and it works with Smartdrive. I will not guarantee that it will work
correctly with other caches, since I can not test them myself.
To determine if it is working, the drive light should flash occasionally
during the process, and not just at the end of it. To be safe, I
recommend disabling the cache if possible. See your cache manual or
call the manufacturer for info on how to do this. You may give up
some file performance, but you gain security. The choice is yours.
USAGE:
OBLIT [?] [= [path]filename]
Items in brackets are optional.
? -include this on the command line for the
help screen.
= [path]filename -bypasses questions and directly
Oblits the filename. You may
include a path.
If you specify a filename on the command line, OBLIT will
just go ahead and obliterate that file. This could be useful
for batch files. Please note that OBLIT will not accept any
wildcards (*,?) in a filename. Suppose I wanted to OBLIT a file
called SECRET.TXT on the C: drive. I would type
OBLIT = C:\SECRET.TXT
If you do not specify any command line options, OBLIT warns you
what it does, and asks for a filename. You must enter a filename,
and the filename can include a path. OBLIT will not accept any
wildcards (*,?) in the filename. This prevents accidental
catastophic obliterations. Suppose I wanted to OBLIT a file
called PERSONAL.TXT on the B: drive in the directory DOCS.
I would type: B:\DOCS\PERSONAL.TXT
Note that you can not OBLIT an already deleted file. You must
undelete it first and THEN OBLIT it. If you don't know how to use
the undelete command, look it up in your DOS manual.
Next, OBLIT warns you again that the file will be GONE when it
is done. You must type YES in capital letters for OBLIT to work.
Any other response will abort the operation with an OK message.
If you type YES, then moments later you can rest assured the file
is absolutely obliterated. An OBLIT takes longer than a delete.
Be patient. On a 486DX-40 with a cacheing controller and a new
drive, a 64Kbyte file takes 15 seconds and a 256Kbyte file takes
50 seconds to obliterate. A 64Kbyte file on a floppy takes 6 minutes
and 10 seconds.
AN OBLITed FILE IS HISTORY! GONE! KAPUT! NICHT! NOT! VOID! NULL!
BE ABSOLUTELY CERTAIN YOU NEVER WANT THE FILE AGAIN. THERE IS
NO TURNING BACK FROM AN OBLIT! REPEAT AFTER ME: "OBLIT IS PERMANENT
LIKE DEATH AND TAXES, THERE IS NO RECOVERY POSSIBLE!"
Good Luck!
Comments? Complaints? Gossip? Compuserve 72223,1722
Tolgathian Software - purveyors of fine no frills utilities.