rouge568
September 10th, 2008, 02:04 AM
Ok, so suppose that you're an elite Neo-esque hacker and have been *gasp* creating malicious software targeting the upper echelon of government intelligence. Everything has been going fine, until now. It turns out that flagburner735 was actually an undercover agent posing as a customer. You are officially screwed, and can hear the sirens closing in from the difference. You quickly throw your notes into the fireplace and light them up, glad that there is no other physical evidence. You hurry over to your computer terminal, very aware that there is a myriad of incriminating evidence stashed away in the drives. Luckily, you have created a script ahead of time that will nuke any possible evidence quickly and effectively.
What is that script?
Here are the things it needs to do:
Wipe out sensitive data in under 1 minute (although it is more important to be thorough than fast)
Target information in priorities (/home should go first, but there is no need to destroy /proc)
Destroy data to the point that the pesky lab technicians at the FBI can't recover it
Be root protected, and ask for a quick confirmation before running
Be readily accessible - you will only type the command "nuke" into a terminal
The quality of this script could mean the difference between a life in prison and freedom. What is that script?
What is that script?
Here are the things it needs to do:
Wipe out sensitive data in under 1 minute (although it is more important to be thorough than fast)
Target information in priorities (/home should go first, but there is no need to destroy /proc)
Destroy data to the point that the pesky lab technicians at the FBI can't recover it
Be root protected, and ask for a quick confirmation before running
Be readily accessible - you will only type the command "nuke" into a terminal
The quality of this script could mean the difference between a life in prison and freedom. What is that script?