Author Archives: Dale

Securely Erasing your data. Dont be the next ebay fail.

The more we use computers, the more data we store on them. This data can be personal information, financial information, pictures of our family and friends, and more. However computers don’t last forever, and neither foes the hard disks we use to store our data on. This also includes our MP3 players, removable storage, digital cameras, etc.
I am sure you will have all seen the numerous stories in the media this year about camera’s, computers and hard disks being put up for sale on eBay only to find its got top secret military plans, or under cover spy information, customers financial records and pictures of things no one ever wanted to see. You may find this amazing, and often funny, but have you thought about your own data when you come to sell on your computer, give it to a friend or charity? Simple formatting and reinstalling the operating system is no guarantee your old data cant be recovered. You may also be responsible for hardware disposal at your organisation, perhaps you work in a government environment and are expected to remove all data from drives before disposal or selling.
The aim of this blog post is just to inform you about some of the opensource and commercial products that are available to help you securely erase your information, and reduce the risk of someone recovering your precious data.

Physical Destruction
Physical destruction of a hard disk is the most extreme method, but in some ways the most secure. Simply smashing up a hard disk with a hammer can be very effective and enjoyable :) Just make sure you give it a good beating, as it is possible to restore the platters on occasion. The other method is to utilise the hard disk shredding facilities many companies offer, its not always cheap but it would make it a time consuming job to try and stick it all back together blue peter style. Finally degaussing is another method that can be used, this is passing a high powered magnet over the drive to scramble the data. Unlike the other methods a hard disk can sometimes be used after it has been degaussed.
crushed_roundedshreddingdegause

Software Destruction
The programs mentioned below offer logical options for securely erasing your data. This is achieved by multiple overwrites of random data. Depending on the level of guarantee you want you can select more or less overwrite passes, obviously this can be time consuming, so its a trade off. When dealing with military or government grade material, where physical destruction is not required there are specific defined requirements on the number of passes required, along with the type of data overwrite.

Secure Erase
Secure erase is built into the  hard disk drive itself and thus is far less susceptible to malicious software attack than external software utilities.
The SE command is implemented in all ATA interface drives manufactured after 2001 (drives with capacities greater than 15 GB), according to testing by CMRR. Secure erase is a positive  easy-to-use data destroy command, amounting to “electronic data shredding.” Executing the command causes a drive to internally completely erase all possible user data record areas by overwriting, including g-list records that could contain readable data in reallocated disk sectors (sectors that the drive no longer uses because they have hard errors).
SE is a simple addition to the existing “format drive” command present in computer operating systems and storage system software, and adds no  cost to hard disk drives. Because the Secure Erase command is carried out within hard disk drives, no additional software is required either.

Eraser
Eraser is a nifty piece of software that you can use to do secure deletes of files from within your OS as well as securely overwriting the empty space on your drives. Eraser works with most version of Microsoft Windows and its an opensource product. It has various overwrite modes so there is something for everyone. I really like this tools, it does the job with no fuss.
Eraser

DBAN
Darik’s Boot and Nuke is a self-contained boot disk that securely wipes the hard disks of most computers. DBAN will automatically and completely delete the contents of any hard disk that it can detect, which makes it an appropriate utility for bulk or emergency data destruction.
DBAN is a means of ensuring due diligence in computer recycling, a way of preventing identity theft if you want to sell a computer, and a good way to totally clean a Microsoft Windows installation of viruses and spyware. DBAN prevents or thoroughly hinders all known techniques of hard disk forensic analysis. DBAN is a free software product that can be used at home or in a business at zero cost.
I have been using this for a long time now, both at home and at work. You may be familiar with it if your a user of the Ultimate Boot CD.
dban2

Wipe Drive Pro
Wipe Drive Pro is a commercial product used by many government organisations to securely erase hard disks and over removable media. There is a demo available, but the product itself costs about $100. I have personally not used this product myself, but is an option for you to look into.

BC Wipe
BC Wipe is a commercial product used by many government and defense agencies. BC Wipe enables you to permanently erase files so that they can never be recovered or undeleted. BCWipe embeds itself within Windows and can be activated from the Explorer FILE Menu OR from the context (right click) menu OR from a command-line prompt. BCWipe complies with both the U.S. Department of Defense (DoD 5220.22-M) standard or the Peter Gutmann wiping schemes, either of which can be invoked from within the product. You can also create and use your own customized wiping scheme to wipe sensitive information from storage devices installed on your computer. BC Wipe has offerings for Windows, Mac and Linux, and costs around $40.
BCWipe_5

Blancco
Blancco like the other tools is again a commercial product used by many government organisations to securely erase data from hard disks. Permanently erase data to prevent data recovery from unwanted sources, use a data shredder product such as Blancco File Shredder for day-to-day needs, or get IT asset management software to control, redeploy or resell your company’s IT assets. Blancco’s products and services are for professional use, often referred to as ‘enterprise grade’ and offer data erasure, reporting and auditing. Blancco starts at about £22 for the standard edition, and currently is only available for Windows.
blancco---pro

IBAS Expert Eraser
ExpertEraser is a program that runs from your floppy drive, allowing your entire hard disk to be overwritten securely. It can run on any computer that can boot to DOS from a floppy diskette  / CDROM, regardless of how the drive was formatted. The program exceeds US DoD standard 5220.22-M. The purpose of ExpertEraser is to remove all traces of information from a hard drive. By utilising cutting edge erasure technology, ExpertEraser provides users with an efficient tool for removing all traces of data from hard drive slated for disposal, recycling or reuse.
ExpertEraser

KROLL Ontrack Eraser
Ontrack Eraser software is an easy-to-use, highly flexible data erasure tool that erases all traces of data stored on a targeted media – ensuring that sensitive information does not fall into the wrong hands. Ontrack Eraser has been approved by the CESG to the highest HMG Infosec 5 standards.

Fast cracking of WPA with TKIP, even more reason to dump TKIP.

So we have known for some time now that WEP is little better than no encryption, about a  year ago it was found that using TKIP with WPA had a vulnerability to weaken associated implementations of WPA.
Now scientists in Japan have reportedly come up with a break WPA TKIP secured wireless in less than a minute. The specific details have not been fully discussed, but details have been documented here and will be presented at the IEICE in September.

You can read more over at Network World, but the message is clear really if you have the ability you should be using WPA or WPA2 with AES not TKIP.

Password Managers, something worth considering. Some Options

Password-PostItI think we all appreciate that we all have lots of passwords to remember, especially if your working in the IT industry. Now a lot of us have good methods to mentally store the various passwords, however its still not uncommon to see a Post-It on the monitor, stuck under the keyboard, or even a big white sticker stuck directly on the front of a laptop.

Many years ago when I worked in a small office, I had a phone call from a user explaining how his password had gone. He hadn’t forgotten it, it had gone. This didn’t make any sense, so I went to see him. Turned out his password was the serial number of a near by fire extinguisher, and this has recently been replaced and moved else where in the building. Creative thinking, but a little bit flawed 🙂

With many organisations passwords are still the key to gaining access to the system. This may cover one of more of the following, such as encryption password, network log on, mail access, bank information and more. So its clear passwords are important, and its not something with should be sharing and advertising to every passer by. So aside from continuing user awareness on the importance, what other solutions could be considered.

Well one option is a Password Manager. Essentially a password manager is an application, add-on or device that can store all your passwords in a secure encrypted format, that you protect with a single complex passphrase. With this in mind I have had a little look at some of the offerings available, both opensource and commercial to provide a single place to start you on your search for the right solution for you and your company.

Firefox Password Manager
So we could consider this as putting all your eggs in one basket, but its possibly better than using post it notes, and a plain text file to store all your passwords. Granted there is always a possibility of a browser exploit leading to a vulnerability that could gain access, so also keep this in mind. If you do use the Firefox Password Manager, ensure that you set a strong master password. I am not sure specifically how the passwords are stored, but at least it will require you to enter a password to have the stored passwords available, so not just anyone using your machine would have access.
FireFoxPasswordManager

Access Manager
Access Manager is a great free password management tool. Your passwords are safely encrypted with AES and Blowfish, and the tool has a simple and easy to use interface, and like most of these applications you can install it onto a removable media. A nice little function of this tool is the Password Selector, when logging onto some security web sites they require different letters or numbers from your password and the password selector tool makes this easy for you.
AccessManager

KeePass
The KeePass Password Safe is probably my favorite application (aside from my IronKey) for storing passwords. KeePass secures your password with AES and Twofish encryption, and it has what I think is a simple easy to use interface, oh and its Free to. It doesn’t need to be installed on your system so you can easily run it from a thumb drive or other removable storage, and it also has a neat password generator. There are versions for Windows, Mac and Linux so should be something for everyone.
KeePass

Keeper
Keeper Password and Data Vault is not a free tool, but there is a demo available before parting with your precious $15. I have heard good things about this product from others in the InfoSec community but I have not used it myself. One advantage is that it works on the Mac and for those with an iPhone you can sync your passwords, so that could be handy.
Keeper

IronKey
I appreciate not everyone has an IronKey (not cheap, but awesome) but if you do you may want to considering using the inbuilt password manager and password generator. The advantage you have with the IronKey is that it uses AES like the other offerings but it has the advantages of all the other IronKey offerings, specifically the hardware encryption.
IronKeyPassword

I am sure there are many more solutions, but I think this gives you a little insight into whats available so you can do your own research on these products as well as digging deeper into other applications and options for securing your precious passwords.

A little tip though, use a strong passphrase you wont forget as if you do, you wont be getting easy access to your passwords. So don’t put it on a sticky on your screen. If you really do need to write it down, secure the paper somewhere safe and secure and totally separate from your IT equipment, and don’t make it obvious as what its for…. perhaps get  a safe 😀

BS10012 The Data Protection Act Personal Information Management System (PIMS)

I recently took the opportunity to attend a seminar on the newly released BS10012 standard, which was hosted by URM and BSI.
Basically this standard is a mechanism / process for an organisation to implement to ensure they have a routine and measurable process meeting the Data Protection Act (DPA) requirements. There isn’t currently a certification for this standard, but this may change with demand. However the BS standard does provide the plan, do, check, act framework to help meet obligations and improve the process over time.

I am not a big fan of certification just for the sake of it, I instead believe the standards can be used to form a baseline, as they are essentially documented best practice.

The standard isn’t UK specific so can be of value to any organisation struggling to meet their DPA requirements. Apparently 65% of organisations in the UK are not meeting the obligations. I guess at the moment the ICO doesn’t have the resource to go looking, and just have to wait for someone to slip up. They are increasing the costs associated with DPA notification from £35 to £500, so this is a serious increase, so perhaps we can expect a more proactive approach to seeking out non compliance.

The conference had some benefit, and cleared up some DPA obligations to me, and showed how this new standard could fit in with ISO27001. Just thought I would share its existence, as its only about 7 weeks old.

So whats this BSI10012 standard all about? Its basically a standard that specifies the requirements for a personal information management system (PIMS), which provides an infrastructure to maintain and improve compliance to the DPA requirements. It follows the Plan, Do, Check, Act cycle that people will be familiar with if you have worked with other BS, ISO and ITIL standards.

Many organisations in the UK are failing in their DPA obligations, and perhaps this  new standard will provide a baseline worth adopting. Obviously is optional, but its early days. I do feel that the ICO are really going to start taking a much deeper in organisations compliance, so if your organisation works best following a predefined baseline structure, BS10012 might be worth considering.

UK Government once again propose to cut off file sharers

It seems that Business Secretary Lord Mandelson has got involved in the recently publish digital britian report, and is now pushing hard to have people who share music and videos cut off. I am not saying its right that people should be doing this, but who can effectively police this. I assume there will be no proper investigation to ensure the ISP subscriber was the actual person doing the downloading, and not someone who hopped on their insecure wireless.

I am sure we will see some uproar from this in the not to distant future. Soon fully encrypted P2P will be the norm.

Read more on the BBC website.

100 Things Your Kids May Never Know About

Stumbled across a great article on the Wired website today, and thought it would be worth linking to for your enjoyment.

There are some things in this world that will never be forgotten, this week’s 40th anniversary of the moon landing for one. But Moore’s Law and our ever-increasing quest for simpler, smaller, faster and better widgets and thingamabobs will always ensure that some of the technology we grew up with will not be passed down the line to the next generation of geeks.

That is, of course, unless we tell them all about the good old days of modems and typewriters, slide rules and encyclopedias

    Computers and Videogaming

  1. Wires. OK, so they’re not gone yet, but it won’t be long
  2. The scream of a modem connecting.
  3. The buzz of a dot-matrix printer
  4. 5- and 3-inch floppies, Zip Discs and countless other forms of data storage.
  5. Using jumpers to set IRQs.
  6. DOS.
  7. Terminals accessing the mainframe.
  8. Screens being just green (or orange) on black.

Click here to read the full article.

GeekDad