Still working to recover. Please don't edit quite yet.

Difference between revisions of "undelete attack"

From Anarchopedia
Jump to: navigation, search
m (Undelete Attack moved to undelete attack)
(anarchawikification)
Line 1: Line 1:
See also: [[Security]] | [[Attack]] | [[Cryptography/Attacks]] | [[File Wipe]] | [[Data recovery]]
+
'''Undelete attack''' is a type of attack that locates and restores [[file]]s that have been [[delete (computing)|deleted]] but not yet overwritten.  This is commonly used against [[computer]]s that are suspected of having illegal materials but can be used as a form of [[espionage]].  The same [[technology]] is used as a convinience for processes such as simple as recovering accidentally deleted files such as with [[Norton Utilities]].
 
+
A type of [[attack]] that locates and restores [[files]] that have been deleted but not yet overwritten.  This is commonly used against computers that are suspected of having illegal materials but can be used as a form of espionage.  The same [[technology]] is used as a convinience for processes such as simple as recovering accidentally deleted files such as with Norton Utilities.
+
  
 
Sometimes, files can be retrieved in the laboratory using [[computer]] [[forensic]]s even after they have been deleted and overwritten.
 
Sometimes, files can be retrieved in the laboratory using [[computer]] [[forensic]]s even after they have been deleted and overwritten.
  
[[Windows]] and pre-[[OS X]] [[Macintosh]] users must remember that, when they empty the Recycle Bin / Trash Can, the files are still present until overwritten by new information as the hard drive fills up. [[UNIX]] systems are much less vulnerable to this type of attack because of the way they handle deleted files.
+
All [[partition type]]s are vulnerable to this, but [[File Alocation Table]] and some simmilar ones is actually more vulnerable than others. In FAT only the first letter of the [[file name]] is actually erased, the rest of the file is left completely intact. But [[bleeding track file recovery]] can be used on almost every magnetic storage media.
  
 
==== Defeating the Undelete Attack ====
 
==== Defeating the Undelete Attack ====
  
* [[File Wipe]] - akin to a document-shredder, overwriting swap file space or the entirety of a hard-drive's free space
+
* [[file wipe]] - akin to a document-shredder, overwriting swap file space or the entirety of a hard-drive's free space
* [[Cryptography/Volumes|Encrypted Volumes]] - only useful once "unmounted," or disconnected, from
+
* [[encrypted volumes]] - only useful once "unmounted," or disconnected, from
* Good [[physical security]] to prevent access
+
* Good [[physical computer security]] to prevent access
 +
 
 +
==See also==
 +
* [[computer security]]
 +
* [[forensic]]
  
 
{{infoanarchy|Undelete_Attack|Undelete Attack}}
 
{{infoanarchy|Undelete_Attack|Undelete Attack}}
 +
 +
[[Category:Privacy]]
 +
[[Category:Forensics]]

Revision as of 22:54, 12 July 2006

Undelete attack is a type of attack that locates and restores files that have been deleted but not yet overwritten. This is commonly used against computers that are suspected of having illegal materials but can be used as a form of espionage. The same technology is used as a convinience for processes such as simple as recovering accidentally deleted files such as with Norton Utilities.

Sometimes, files can be retrieved in the laboratory using computer forensics even after they have been deleted and overwritten.

All partition types are vulnerable to this, but File Alocation Table and some simmilar ones is actually more vulnerable than others. In FAT only the first letter of the file name is actually erased, the rest of the file is left completely intact. But bleeding track file recovery can be used on almost every magnetic storage media.

Defeating the Undelete Attack

See also

This article is based on a public domain infoAnarchy article: Undelete_Attack iA