Shred File Wiper Insecure File Deletion Vulnerability

"Using the icat utility from Dan Farmer and Wietze Venema's TCT Toolkit it appears that the data is not overwritten."
(Excerpted from original bugtraq post by Jeff Harlan <Jeff.Harlan@mail.sprint.com>)


 

Privacy Statement
Copyright 2010, SecurityFocus