SlideShare une entreprise Scribd logo
1  sur  27
Secure Deletion Of
Data On The Cloud
By : Bhanu Priya
Supervisor : Dr.Richard
Sinnott
Cloud Nectar
The Need For Secure
Deletion Of Data On The
Cloud
1) Used In Banks
Need For Secure Deletion
Of Data On The Cloud
3) Cloud Used In Business
Need For Secure Deletion
Of Data On The Cloud
Multiple Copies Of Data On The Cloud
Research Work :
• Test Various Linux Based Secure Deletion Of Data Tools
.Test the basic linux utilities like (rm , rmdir etc).
• Test whether data can be recovered using linux based data
recovery tools .
• Find the optimal solution for the use of secure deletion of
data tools
• If Data is Removed from a single machine , the copies of
that data should be removed from other virtual machines as
well.The aim is to achieve parallel synchronisation of all the
servers.
Secure Deletion Of Data
Tools Used
• Wipe wipe <filename>
• SRM sudo srm /path/to/file
• SHRED shred -u -z -n filename
• RM rm <filename>
• SMEM smem [-f][-l][-l][-v]
• SFILL sfill -f -v -ll /path/to/directory
• SSWAP cat /proc/swaps
Video Files :
Video File
Size
WIPE SHRED SRM RM RM -RF
1 kb 1 SEC 1 SEC 1 SEC I SEC 1 SEC
10kb 1 SEC 1 SEC 1 SEC 1 SEC 1 SEC
100kb 1 SEC 1 SEC 1 SEC 1 SEC 1 SEC
1Mb 1 MINUTE 1 SEC 2 SEC 1 SEC 1 SEC
100 Mb
3 MIN 53
S
1 MIN 5 MIN 1 SEC 1 SEC
1 Gb 1 HR 11 M 7 MIN 1 HR 10 M 1 SEC 1 SEC
10Gb 2 HR 45 M 1 HR 12 M > 3 HRS 1 SEC 1 SEC
10 Mb 2 MIN 1 MIN 1 MIN 1 SEC 1 SEC
280.4 Mb 13 MIN 2 MIN 18 MIN 1 SEC 1 SEC
base 64 /dev/urandom | head -c <byte> > <filename>
IMAGE FILES :
IMAGE FILE WIPE SHRED SRM
1 KB 1 SEC 1 SEC 1 SEC
10 KB 1 SEC 1 SEC 1 SEC
100 KB 1 SEC 1 SEC 1 SEC
1 MB 2 SEC 1 SEC 2 SEC
10 MB 13 SEC 2 SEC 1 MIN
100 MB 4 MIN 1 MIN 6 MIN
1 GB 53 MIN 7 MIN 1 HR 20 MIN
10 GB 2 HR 45 MIN 1 HR 12 MIN > 3 HOURS
TEXT FILES :
TEXT FILES WIPE SHRED SRM
1 KB 1 SEC 1 SEC 1 SEC
10KB 1 SEC 1 SEC 1 SEC
100 KB 1 SEC 1 SEC 1 SEC
1 MB 2 SEC 1 SEC 3 SEC
10 MB 13 SEC 3 SEC 39 SEC
100 MB 5 MIN 1 MIN 7 MIN
1 GB 54 MIN 9 MIN 1 HR 21 M
SMEM (Secure Memory)
• An Open source Tool To see , the users and the
processors that are using the physical memory.
• It has three options.view the system wide memory
usage , view the memory usage by each user,to view
the memory usage by mapping .
smem -w
smem -u
sswap:
cat /proc/swaps
SFIL
L
• One Of The Secure-Delete Tools.
• It searches for free space in the specified
partition and fills it up with some data to
avoid recovery of data from the free space
.
• syntax : sudo sfill /home.
photorec :
1) Choose the partition to recover from
Photorec:
2) choose the file system to recover from
PhotoRec:
3) Select the type of file you want to recover
Photorec:
4) Select the file system again
Photorec :
ect whether you want to recover the free space or the entire parti
Photorec
6) select the destination of the recovered files
Photorec:
7) Recovery starts
Photorec:
8) Recovery completed
Cluster SSH :
Comparison Of The Secure Deletion Of
Data Tools On The Basis Of Recovery By
PhotoRec
Images Videos Text
Wipe
Shred
Srm
rm
NO NO YES
NO NO YES
NO NO YES
YES NO YES
THANK
YOU
By:
Bhanu Priya

Contenu connexe

Tendances

A Brief History of System Calls
A Brief History of System CallsA Brief History of System Calls
A Brief History of System Callsahl0003
 
Linux monitoring and Troubleshooting for DBA's
Linux monitoring and Troubleshooting for DBA'sLinux monitoring and Troubleshooting for DBA's
Linux monitoring and Troubleshooting for DBA'sMydbops
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPFAlex Maestretti
 
Garbage Collection in .NET
Garbage Collection in .NETGarbage Collection in .NET
Garbage Collection in .NETYuriy Shapovalov
 
Linux basics and commands - from lynxbee.com
Linux basics and commands - from lynxbee.comLinux basics and commands - from lynxbee.com
Linux basics and commands - from lynxbee.comGreen Ecosystem
 
The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]
The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]
The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]Alluxio, Inc.
 
Spying on the Linux kernel for fun and profit
Spying on the Linux kernel for fun and profitSpying on the Linux kernel for fun and profit
Spying on the Linux kernel for fun and profitAndrea Righi
 
New Ways to Find Latency in Linux Using Tracing
New Ways to Find Latency in Linux Using TracingNew Ways to Find Latency in Linux Using Tracing
New Ways to Find Latency in Linux Using TracingScyllaDB
 
LISA18: Hidden Linux Metrics with Prometheus eBPF Exporter
LISA18: Hidden Linux Metrics with Prometheus eBPF ExporterLISA18: Hidden Linux Metrics with Prometheus eBPF Exporter
LISA18: Hidden Linux Metrics with Prometheus eBPF ExporterIvan Babrou
 
Linux Server Start
Linux Server StartLinux Server Start
Linux Server StartGavin Quan
 
eBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to UserspaceeBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to UserspaceSUSE Labs Taipei
 
LISA2019 Linux Systems Performance
LISA2019 Linux Systems PerformanceLISA2019 Linux Systems Performance
LISA2019 Linux Systems PerformanceBrendan Gregg
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileKenny (netman)
 
Linux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPFLinux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPFBrendan Gregg
 
IntelON 2021 Processor Benchmarking
IntelON 2021 Processor BenchmarkingIntelON 2021 Processor Benchmarking
IntelON 2021 Processor BenchmarkingBrendan Gregg
 

Tendances (20)

A Brief History of System Calls
A Brief History of System CallsA Brief History of System Calls
A Brief History of System Calls
 
Linux monitoring and Troubleshooting for DBA's
Linux monitoring and Troubleshooting for DBA'sLinux monitoring and Troubleshooting for DBA's
Linux monitoring and Troubleshooting for DBA's
 
Security Monitoring with eBPF
Security Monitoring with eBPFSecurity Monitoring with eBPF
Security Monitoring with eBPF
 
Basic of Systemd
Basic of SystemdBasic of Systemd
Basic of Systemd
 
Garbage Collection in .NET
Garbage Collection in .NETGarbage Collection in .NET
Garbage Collection in .NET
 
Linux basics and commands - from lynxbee.com
Linux basics and commands - from lynxbee.comLinux basics and commands - from lynxbee.com
Linux basics and commands - from lynxbee.com
 
The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]
The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]
The Practice of Alluxio in Near Real-Time Data Platform at VIPShop [Chinese]
 
Spying on the Linux kernel for fun and profit
Spying on the Linux kernel for fun and profitSpying on the Linux kernel for fun and profit
Spying on the Linux kernel for fun and profit
 
50 most frequently used unix
50 most frequently used unix50 most frequently used unix
50 most frequently used unix
 
New Ways to Find Latency in Linux Using Tracing
New Ways to Find Latency in Linux Using TracingNew Ways to Find Latency in Linux Using Tracing
New Ways to Find Latency in Linux Using Tracing
 
LISA18: Hidden Linux Metrics with Prometheus eBPF Exporter
LISA18: Hidden Linux Metrics with Prometheus eBPF ExporterLISA18: Hidden Linux Metrics with Prometheus eBPF Exporter
LISA18: Hidden Linux Metrics with Prometheus eBPF Exporter
 
50 Most Frequently Used UNIX Linux Commands -hmftj
50 Most Frequently Used UNIX  Linux Commands -hmftj50 Most Frequently Used UNIX  Linux Commands -hmftj
50 Most Frequently Used UNIX Linux Commands -hmftj
 
Alluxio in MOMO
Alluxio in MOMOAlluxio in MOMO
Alluxio in MOMO
 
Linux Server Start
Linux Server StartLinux Server Start
Linux Server Start
 
eBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to UserspaceeBPF Trace from Kernel to Userspace
eBPF Trace from Kernel to Userspace
 
LISA2019 Linux Systems Performance
LISA2019 Linux Systems PerformanceLISA2019 Linux Systems Performance
LISA2019 Linux Systems Performance
 
Linux fundamental - Chap 03 file
Linux fundamental - Chap 03 fileLinux fundamental - Chap 03 file
Linux fundamental - Chap 03 file
 
Bash Introduction
Bash IntroductionBash Introduction
Bash Introduction
 
Linux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPFLinux 4.x Tracing: Performance Analysis with bcc/BPF
Linux 4.x Tracing: Performance Analysis with bcc/BPF
 
IntelON 2021 Processor Benchmarking
IntelON 2021 Processor BenchmarkingIntelON 2021 Processor Benchmarking
IntelON 2021 Processor Benchmarking
 

En vedette

Introducing and arranging a thesis writ 1122
Introducing and arranging a thesis   writ 1122Introducing and arranging a thesis   writ 1122
Introducing and arranging a thesis writ 1122writRHET -
 
Fattening Hogs Digitized
Fattening Hogs DigitizedFattening Hogs Digitized
Fattening Hogs Digitizedguilodj
 
Open archives initiatives(final)
 Open archives initiatives(final) Open archives initiatives(final)
Open archives initiatives(final)floyd taag
 
HOG and POULTRY RAISING, (BENEFITS)
HOG and POULTRY RAISING, (BENEFITS)HOG and POULTRY RAISING, (BENEFITS)
HOG and POULTRY RAISING, (BENEFITS)Deslate Maguate
 
Swine industry in the philippines~aeroul berro
Swine industry in the philippines~aeroul berroSwine industry in the philippines~aeroul berro
Swine industry in the philippines~aeroul berrohumanupgrade velasquez
 
A Project Feasibility Study for the Establishment of E&J Farms
A Project Feasibility Study for the Establishment of E&J FarmsA Project Feasibility Study for the Establishment of E&J Farms
A Project Feasibility Study for the Establishment of E&J FarmsJandel Gimeno
 

En vedette (11)

anguyen_thesis_FINAL
anguyen_thesis_FINALanguyen_thesis_FINAL
anguyen_thesis_FINAL
 
Introducing and arranging a thesis writ 1122
Introducing and arranging a thesis   writ 1122Introducing and arranging a thesis   writ 1122
Introducing and arranging a thesis writ 1122
 
Fattening Hogs Digitized
Fattening Hogs DigitizedFattening Hogs Digitized
Fattening Hogs Digitized
 
Open archives initiatives(final)
 Open archives initiatives(final) Open archives initiatives(final)
Open archives initiatives(final)
 
Thesis Summary
Thesis SummaryThesis Summary
Thesis Summary
 
HOG and POULTRY RAISING, (BENEFITS)
HOG and POULTRY RAISING, (BENEFITS)HOG and POULTRY RAISING, (BENEFITS)
HOG and POULTRY RAISING, (BENEFITS)
 
Breeds Of Swine
Breeds Of SwineBreeds Of Swine
Breeds Of Swine
 
Swine
SwineSwine
Swine
 
Swine production
Swine productionSwine production
Swine production
 
Swine industry in the philippines~aeroul berro
Swine industry in the philippines~aeroul berroSwine industry in the philippines~aeroul berro
Swine industry in the philippines~aeroul berro
 
A Project Feasibility Study for the Establishment of E&J Farms
A Project Feasibility Study for the Establishment of E&J FarmsA Project Feasibility Study for the Establishment of E&J Farms
A Project Feasibility Study for the Establishment of E&J Farms
 

Similaire à final presentation edited final

COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATIONCOLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATIONEyesOpen Association
 
KoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbegan
KoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbeganKoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbegan
KoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbeganTobias Koprowski
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)MongoDB
 
Training Slides: 203 - Backup & Recovery
Training Slides: 203 - Backup & RecoveryTraining Slides: 203 - Backup & Recovery
Training Slides: 203 - Backup & RecoveryContinuent
 
Operating Systems: Revision
Operating Systems: RevisionOperating Systems: Revision
Operating Systems: RevisionDamian T. Gordon
 
Deployment Strategy
Deployment StrategyDeployment Strategy
Deployment StrategyMongoDB
 
Adobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office HoursAdobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office HoursAndrew Khoury
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX SecurityHelpSystems
 
Deployment Strategies
Deployment StrategiesDeployment Strategies
Deployment StrategiesMongoDB
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganTobias Koprowski
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganTobias Koprowski
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questionsTeja Bheemanapally
 
What the Heck Just Happened?
What the Heck Just Happened?What the Heck Just Happened?
What the Heck Just Happened?Ken Evans
 
How to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezHow to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezShakacon
 
KoprowskiT_2AMaDisasterJustBeganAD2018
KoprowskiT_2AMaDisasterJustBeganAD2018KoprowskiT_2AMaDisasterJustBeganAD2018
KoprowskiT_2AMaDisasterJustBeganAD2018Tobias Koprowski
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganTobias Koprowski
 
Backup, Restore, and Disaster Recovery
Backup, Restore, and Disaster RecoveryBackup, Restore, and Disaster Recovery
Backup, Restore, and Disaster RecoveryMongoDB
 
Live Memory Forensics on Android devices
Live Memory Forensics on Android devicesLive Memory Forensics on Android devices
Live Memory Forensics on Android devicesNikos Gkogkos
 
OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101Trinath Somanchi
 

Similaire à final presentation edited final (20)

COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATIONCOLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
COLLECT AND ANALYZE RAM FOR DIGITAL INVESTIGATION
 
KoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbegan
KoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbeganKoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbegan
KoprowskiT_SQLSat219_Kiev_2AM-aDisasterJustbegan
 
Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)Deployment Strategies (Mongo Austin)
Deployment Strategies (Mongo Austin)
 
Training Slides: 203 - Backup & Recovery
Training Slides: 203 - Backup & RecoveryTraining Slides: 203 - Backup & Recovery
Training Slides: 203 - Backup & Recovery
 
Operating Systems: Revision
Operating Systems: RevisionOperating Systems: Revision
Operating Systems: Revision
 
Syslog.ppt
Syslog.pptSyslog.ppt
Syslog.ppt
 
Deployment Strategy
Deployment StrategyDeployment Strategy
Deployment Strategy
 
Adobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office HoursAdobe AEM Maintenance - Customer Care Office Hours
Adobe AEM Maintenance - Customer Care Office Hours
 
10 Tips for AIX Security
10 Tips for AIX Security10 Tips for AIX Security
10 Tips for AIX Security
 
Deployment Strategies
Deployment StrategiesDeployment Strategies
Deployment Strategies
 
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBeganKoprowskiT_SPBizConf_2AMaDisasterJustBegan
KoprowskiT_SPBizConf_2AMaDisasterJustBegan
 
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBeganKoprowskiT_SPBizConference_2AMaDisasterJustBegan
KoprowskiT_SPBizConference_2AMaDisasterJustBegan
 
Linux or unix interview questions
Linux or unix interview questionsLinux or unix interview questions
Linux or unix interview questions
 
What the Heck Just Happened?
What the Heck Just Happened?What the Heck Just Happened?
What the Heck Just Happened?
 
How to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew SuarezHow to Make Android's Bootable Recovery Work For You by Drew Suarez
How to Make Android's Bootable Recovery Work For You by Drew Suarez
 
KoprowskiT_2AMaDisasterJustBeganAD2018
KoprowskiT_2AMaDisasterJustBeganAD2018KoprowskiT_2AMaDisasterJustBeganAD2018
KoprowskiT_2AMaDisasterJustBeganAD2018
 
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBeganKoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
KoprowskiT_PASSEastMidsFEB16_2AMaDisasterJustBegan
 
Backup, Restore, and Disaster Recovery
Backup, Restore, and Disaster RecoveryBackup, Restore, and Disaster Recovery
Backup, Restore, and Disaster Recovery
 
Live Memory Forensics on Android devices
Live Memory Forensics on Android devicesLive Memory Forensics on Android devices
Live Memory Forensics on Android devices
 
OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101OpenStack DRaaS - Freezer - 101
OpenStack DRaaS - Freezer - 101
 

final presentation edited final

  • 1. Secure Deletion Of Data On The Cloud By : Bhanu Priya Supervisor : Dr.Richard Sinnott
  • 3. The Need For Secure Deletion Of Data On The Cloud 1) Used In Banks
  • 4. Need For Secure Deletion Of Data On The Cloud 3) Cloud Used In Business
  • 5. Need For Secure Deletion Of Data On The Cloud Multiple Copies Of Data On The Cloud
  • 6. Research Work : • Test Various Linux Based Secure Deletion Of Data Tools .Test the basic linux utilities like (rm , rmdir etc). • Test whether data can be recovered using linux based data recovery tools . • Find the optimal solution for the use of secure deletion of data tools • If Data is Removed from a single machine , the copies of that data should be removed from other virtual machines as well.The aim is to achieve parallel synchronisation of all the servers.
  • 7. Secure Deletion Of Data Tools Used • Wipe wipe <filename> • SRM sudo srm /path/to/file • SHRED shred -u -z -n filename • RM rm <filename> • SMEM smem [-f][-l][-l][-v] • SFILL sfill -f -v -ll /path/to/directory • SSWAP cat /proc/swaps
  • 8. Video Files : Video File Size WIPE SHRED SRM RM RM -RF 1 kb 1 SEC 1 SEC 1 SEC I SEC 1 SEC 10kb 1 SEC 1 SEC 1 SEC 1 SEC 1 SEC 100kb 1 SEC 1 SEC 1 SEC 1 SEC 1 SEC 1Mb 1 MINUTE 1 SEC 2 SEC 1 SEC 1 SEC 100 Mb 3 MIN 53 S 1 MIN 5 MIN 1 SEC 1 SEC 1 Gb 1 HR 11 M 7 MIN 1 HR 10 M 1 SEC 1 SEC 10Gb 2 HR 45 M 1 HR 12 M > 3 HRS 1 SEC 1 SEC 10 Mb 2 MIN 1 MIN 1 MIN 1 SEC 1 SEC 280.4 Mb 13 MIN 2 MIN 18 MIN 1 SEC 1 SEC base 64 /dev/urandom | head -c <byte> > <filename>
  • 9. IMAGE FILES : IMAGE FILE WIPE SHRED SRM 1 KB 1 SEC 1 SEC 1 SEC 10 KB 1 SEC 1 SEC 1 SEC 100 KB 1 SEC 1 SEC 1 SEC 1 MB 2 SEC 1 SEC 2 SEC 10 MB 13 SEC 2 SEC 1 MIN 100 MB 4 MIN 1 MIN 6 MIN 1 GB 53 MIN 7 MIN 1 HR 20 MIN 10 GB 2 HR 45 MIN 1 HR 12 MIN > 3 HOURS
  • 10. TEXT FILES : TEXT FILES WIPE SHRED SRM 1 KB 1 SEC 1 SEC 1 SEC 10KB 1 SEC 1 SEC 1 SEC 100 KB 1 SEC 1 SEC 1 SEC 1 MB 2 SEC 1 SEC 3 SEC 10 MB 13 SEC 3 SEC 39 SEC 100 MB 5 MIN 1 MIN 7 MIN 1 GB 54 MIN 9 MIN 1 HR 21 M
  • 11. SMEM (Secure Memory) • An Open source Tool To see , the users and the processors that are using the physical memory. • It has three options.view the system wide memory usage , view the memory usage by each user,to view the memory usage by mapping .
  • 12.
  • 16. SFIL L • One Of The Secure-Delete Tools. • It searches for free space in the specified partition and fills it up with some data to avoid recovery of data from the free space . • syntax : sudo sfill /home.
  • 17. photorec : 1) Choose the partition to recover from
  • 18. Photorec: 2) choose the file system to recover from
  • 19. PhotoRec: 3) Select the type of file you want to recover
  • 20. Photorec: 4) Select the file system again
  • 21. Photorec : ect whether you want to recover the free space or the entire parti
  • 22. Photorec 6) select the destination of the recovered files
  • 26. Comparison Of The Secure Deletion Of Data Tools On The Basis Of Recovery By PhotoRec Images Videos Text Wipe Shred Srm rm NO NO YES NO NO YES NO NO YES YES NO YES