Rocksolid Light

Welcome to Rocksolid Light

mail  files  register  newsreader  groups  login

Message-ID:  

Logic doesn't apply to the real world. -- Marvin Minsky


computers / microsoft.public.windowsxp.general / Re: Passwords somehow showing on my C:

SubjectAuthor
* Passwords somehow showing on my C:Nomen Nescio
+- Passwords somehow showing on my C:R.Wieser
`* Passwords somehow showing on my C:Paul
 +* Passwords somehow showing on my C:SpacedOut
 |`- Passwords somehow showing on my C:Paul
 `* Passwords somehow showing on my C:Nomen Nescio
  `- Passwords somehow showing on my C:Paul

1
Passwords somehow showing on my C:

<6e779a862f357648ffd647382dc507ed@dizum.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3276&group=microsoft.public.windowsxp.general#3276

  copy link   Newsgroups: microsoft.public.windowsxp.general
From: nobody@dizum.com (Nomen Nescio)
Injection-Date: Tue, 10 May 2022 15:50:01 +0000 (UTC)
Path: i2pn2.org!i2pn.org!news.neodome.net!mail2news
Newsgroups: microsoft.public.windowsxp.general
Message-ID: <6e779a862f357648ffd647382dc507ed@dizum.com>
Date: Tue, 10 May 2022 17:48:00 +0200 (CEST)
Subject: Passwords somehow showing on my C:
Injection-Info: neodome.net;
posting-account="mail2news";
key="I3DJnGVyeKwKCZCLLg29z6q8oIFpOTYiBTYdtntqiBxggM99JIsoOfbmLgCyyWyTgwsIGM
A8V3RFliAmPjiafrZWkBWVnpafTTOOy9nxm/jG4R3L8a+1n30y+GAHWVc/8IFAh5PG+Gn4fWMPB
8Y0w91JMvhhJk+KVPteBFiXjiBJQeUtdLGaYd9SUehFpDpIJixqN/fYbsKs37tWrrwdIXXjUNUv
8psuOjqtBeLjvrGQQYZ1zMMiaHqmBRHROs+07VlZDlpDl+c9ZRqXR2uHJfFX8fN8VcqGpp5eLYd
bZy6Cj7gtJzz07w2L4uxDQ9xR8Mrsg1RGzyEO/eOOoljf7A==";
data="U2FsdGVkX18O3dLf9WzOlNZWavt6L3t3cKCTOoW3mk096hoS5JhASD68n0lRbwFKuvP2P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";
mail-complaints-to="abuse@neodome.net"
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@dizum.com>.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
 by: Nomen Nescio - Tue, 10 May 2022 15:48 UTC

Disk Investigator has shown me that some of my passwords are showing
on my C: drive.

http://theabsolute.net/sware/dskinv.html

I think their being there might be related to my sometimes
copy/pasting passwords into a program. I might have missed clearing
them from the clipboard after usage. Just guessing on that one.

Is there a program which would allow me to erase/delete those
passwords?

Re: Passwords somehow showing on my C:

<t5eajh$1bag$1@gioia.aioe.org>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3277&group=microsoft.public.windowsxp.general#3277

  copy link   Newsgroups: microsoft.public.windowsxp.general
Path: i2pn2.org!i2pn.org!aioe.org!BHGTVyTGRwF2ntnqLVfpDg.user.46.165.242.75.POSTED!not-for-mail
From: address@not.available (R.Wieser)
Newsgroups: microsoft.public.windowsxp.general
Subject: Re: Passwords somehow showing on my C:
Date: Tue, 10 May 2022 20:23:34 +0200
Organization: Aioe.org NNTP Server
Lines: 31
Message-ID: <t5eajh$1bag$1@gioia.aioe.org>
References: <6e779a862f357648ffd647382dc507ed@dizum.com>
Injection-Info: gioia.aioe.org; logging-data="44368"; posting-host="BHGTVyTGRwF2ntnqLVfpDg.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
X-Notice: Filtered by postfilter v. 0.9.2
X-Newsreader: Microsoft Outlook Express 6.00.2900.5512
X-Priority: 3
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.5512
X-MSMail-Priority: Normal
X-RFC2646: Format=Flowed; Original
 by: R.Wieser - Tue, 10 May 2022 18:23 UTC

Nomen,

You have not told us /where/ DI found those passwords.

A simple file ? Check who it belongs to and see if "something bad"(tm) will
happen if you would decide to delete it.

The pagefile ? THat would be a bit of a problem, as you should not try to
delete it on a running OS (could and normally does crash and damage the OS).

A disk sector not at all connected to anything (free to use by the FS
if-and-when it needs a new one) ? You could try to find an "unused sectors"
disk eraser.

Any other sector (part of the filesyste but not part of a file) ? Well,
that would be a bit of a problem ...

You've got a number of possibilities, all having their own solutions

> Is there a program which would allow me to erase/delete
> those passwords?

As you can tell by the above, its not that easy.

.... But I guess you could securily wipe the whole drive and re-install the
OS. :-)

Regards,
Rudy Wieser

Re: Passwords somehow showing on my C:

<t5eb8v$nc3$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3278&group=microsoft.public.windowsxp.general#3278

  copy link   Newsgroups: microsoft.public.windowsxp.general
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: microsoft.public.windowsxp.general
Subject: Re: Passwords somehow showing on my C:
Date: Tue, 10 May 2022 14:35:10 -0400
Organization: A noiseless patient Spider
Lines: 65
Message-ID: <t5eb8v$nc3$1@dont-email.me>
References: <6e779a862f357648ffd647382dc507ed@dizum.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 10 May 2022 18:35:11 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="ad98651af8dea5f2c7b2c23fce6f6fa7";
logging-data="23939"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX18GE5j33s7ADBeI39wq7kW8gLLXezGs+D0="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:DDeCzM8MS4YMnpRsXMnv/+k+GxI=
In-Reply-To: <6e779a862f357648ffd647382dc507ed@dizum.com>
Content-Language: en-US
 by: Paul - Tue, 10 May 2022 18:35 UTC

On 5/10/2022 11:48 AM, Nomen Nescio wrote:
> Disk Investigator has shown me that some of my passwords are showing
> on my C: drive.
>
> http://theabsolute.net/sware/dskinv.html
>
> I think their being there might be related to my sometimes
> copy/pasting passwords into a program. I might have missed clearing
> them from the clipboard after usage. Just guessing on that one.
>
> Is there a program which would allow me to erase/delete those
> passwords?
>

The passwords would either be in a valid file, or
the passwords could be in "white space", the space
between files.

https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete

sdelete -z C: # 32 bit OS, clean white space on C:
sdelete64 -z C: # 64 bit OS, clean white space on C:
# If on some other partition, change the C:
# to the desired drive letter.

However, the minimum OS requirement is Vista on the current one.
Why exactly, I don't know.

On NTFS, small files are stored inside the $MFT itself.
Sdelete has some mechanism to clean in those crevasses.
The mechanism requires a second pass. The first pass,
is bulk white space cleaning (which cannot clean $MFT).
The second pass, cleans the small file storage area.
Like a dinner fork, there are "spaces between tines" and
that's what the second pass cleans. Small files, naturally,
are used to hold passwords.

https://www.trishtech.com/2010/02/permanently-delete-files-in-windows-xp/

# Vista or later
https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete

# 32-bit for WinXP
https://web.archive.org/web/20101207031537/http://download.sysinternals.com/Files/SDelete.zip

That's a time consuming process, so it would be nice to know
exactly where the passwords are (inside a real file, inside
white space where sdelete can get them).

Just blindly running the cleaner, might get them.

You could use nfi.exe from the roughly 2003 Microsoft package, which
relates LBAs to file names. And that could tell you whether
the file is inside a real file or not.

But your Disk Investigator should be telling you this.
There's not much point making a fuss, unless you tell
the customer where the item in question is. Forcing people
to manually do maths for this job, isn't what computers
are for.

If Disk Investigator is not finding it in a named file...
then Sdelete is what you want for a cleaning.

Paul

Re: Passwords somehow showing on my C:

<t5efgq$1g03$1@gioia.aioe.org>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3279&group=microsoft.public.windowsxp.general#3279

  copy link   Newsgroups: microsoft.public.windowsxp.general
Path: i2pn2.org!i2pn.org!aioe.org!8ER4TMW3TSRnvS06aECo6g.user.46.165.242.91.POSTED!not-for-mail
From: SpacedOut@SpacedOut.com (SpacedOut)
Newsgroups: microsoft.public.windowsxp.general
Subject: Re: Passwords somehow showing on my C:
Date: Tue, 10 May 2022 12:47:37 -0700
Organization: Aioe.org NNTP Server
Message-ID: <t5efgq$1g03$1@gioia.aioe.org>
References: <6e779a862f357648ffd647382dc507ed@dizum.com>
<t5eb8v$nc3$1@dont-email.me>
Mime-Version: 1.0
Content-Type: text/plain; charset=UTF-8; format=flowed
Content-Transfer-Encoding: 8bit
Injection-Info: gioia.aioe.org; logging-data="49155"; posting-host="8ER4TMW3TSRnvS06aECo6g.user.gioia.aioe.org"; mail-complaints-to="abuse@aioe.org";
User-Agent: Mozilla/5.0 (Windows NT 5.1; rv:52.0) Gecko/20100101 Firefox/52.0
SeaMonkey/2.49.5
X-Notice: Filtered by postfilter v. 0.9.2
 by: SpacedOut - Tue, 10 May 2022 19:47 UTC

What is suggested app to look at "white Space" and see what is there ?

Paul wrote:
> On 5/10/2022 11:48 AM, Nomen Nescio wrote:
>> Disk Investigator has shown me that some of my passwords are showing
>> on my C: drive.
>>
>> http://theabsolute.net/sware/dskinv.html
>>
>> I think their being there might be related to my sometimes
>> copy/pasting passwords into a program.  I might have missed clearing
>> them from the clipboard after usage.  Just guessing on that one.
>>
>> Is there a program which would allow me to erase/delete those
>> passwords?
>>
>
> The passwords would either be in a valid file, or
> the passwords could be in "white space", the space
> between files.
>
> https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
>
>    sdelete   -z C:              # 32 bit OS, clean white space on C:
>    sdelete64 -z C:              # 64 bit OS, clean white space on C:
>                                 # If on some other partition, change
> the C:
>                                 # to the desired drive letter.
>
> However, the minimum OS requirement is Vista on the current one.
> Why exactly, I don't know.
>
> On NTFS, small files are stored inside the $MFT itself.
> Sdelete has some mechanism to clean in those crevasses.
> The mechanism requires a second pass. The first pass,
> is bulk white space cleaning (which cannot clean $MFT).
> The second pass, cleans the small file storage area.
> Like a dinner fork, there are "spaces between tines" and
> that's what the second pass cleans. Small files, naturally,
> are used to hold passwords.
>
> https://www.trishtech.com/2010/02/permanently-delete-files-in-windows-xp/
>
>    # Vista or later
>    https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
>
>    # 32-bit for WinXP
>
> https://web.archive.org/web/20101207031537/http://download.sysinternals.com/Files/SDelete.zip
>
>
> That's a time consuming process, so it would be nice to know
> exactly where the passwords are (inside a real file, inside
> white space where sdelete can get them).
>
> Just blindly running the cleaner, might get them.
>
> You could use nfi.exe from the roughly 2003 Microsoft package, which
> relates LBAs to file names. And that could tell you whether
> the file is inside a real file or not.
>
> But your Disk Investigator should be telling you this.
> There's not much point making a fuss, unless you tell
> the customer where the item in question is. Forcing people
> to manually do maths for this job, isn't what computers
> are for.
>
> If Disk Investigator is not finding it in a named file...
> then Sdelete is what you want for a cleaning.
>
>    Paul

Re: Passwords somehow showing on my C:

<t5eihn$pcb$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3280&group=microsoft.public.windowsxp.general#3280

  copy link   Newsgroups: microsoft.public.windowsxp.general
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: microsoft.public.windowsxp.general
Subject: Re: Passwords somehow showing on my C:
Date: Tue, 10 May 2022 16:39:18 -0400
Organization: A noiseless patient Spider
Lines: 47
Message-ID: <t5eihn$pcb$1@dont-email.me>
References: <6e779a862f357648ffd647382dc507ed@dizum.com>
<t5eb8v$nc3$1@dont-email.me> <t5efgq$1g03$1@gioia.aioe.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Tue, 10 May 2022 20:39:20 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="ad98651af8dea5f2c7b2c23fce6f6fa7";
logging-data="25995"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19+IftPOK8SNlV5jKrDDbUe/kFeG9mK9vs="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:JpvZwugCjhtlVC/rxkOwaGo/AyU=
In-Reply-To: <t5efgq$1g03$1@gioia.aioe.org>
Content-Language: en-US
 by: Paul - Tue, 10 May 2022 20:39 UTC

On 5/10/2022 3:47 PM, SpacedOut wrote:
>
> What is suggested app to look at "white Space" and see what is there ?

I haven't seen good tools for this.

The software you're using, has spotted the passwords. That's good.

But identifying parts of the file system, as a function of LBA,
only the old Norton Disk Editor tool for NTFS, sorta did that for you.
The idea has not been popular in later designs by others.

I use HxD for tasks like this, but it does not have the
tools to "do a Norton" on the disk either. I've had to do
some of this manually, such as equating unreadable sectors
to certain files (or white space). When my WD Blue started
showing problems, two disk errors were inside files (bad),
two disk errors were in white space ("good"). But I had to
sit there with a calculator, to work out which things
were involved.

Maybe someone else here, will chime in with a tool for this.

While you could tar up all the files on a volume and then
search the tarfile for visible passwords, even that
isn't a sure thing, as it's very hard to get thorough/complete
anything on these systems. I have *no* tools that absolutely
list every file on a hard drive. Every tool I've got, gives
a slightly different list of files for the hard drive.

From a forensics point of view, the computers we use are
"craptastic". Everything you do on them, is hard work.

********

The easy way, is just run sdelete on it, and clean the
white space, then use your Disk Investigator and do a second scan.
Then if you get a hit, it's in a file.

Note that, sometimes, even the act of *typing the thing to search for*,
gets logged in a file! When I've done forensic tests for people
in the past (check how leaky something is), even the search
tool can pollute the drive. Only the people who work in forensics
on a full time basis, get the tiny details like this right. If
a hobbyist writes you a tool, they can screw up details like that.

Paul

Re: Passwords somehow showing on my C:

<617366595b7c1c800171e6066d0e9024@dizum.com>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3281&group=microsoft.public.windowsxp.general#3281

  copy link   Newsgroups: microsoft.public.windowsxp.general
Injection-Info: neodome.net;
posting-account="mail2news";
key="E6lqAL/eDXbwFM8L3NxOimnpBeWBaj6fnq1iL5lBfJnrp/aL7mBF+iW3T7Cz5kzYfwTElS
SIfgb0WO5zOnstPcPnjMNfbpjM4lYOUDJCzui4RAdAUeRK0JKUvzQgdPIBLz3lSaaXRkH0keVcO
ChOShvuNASS9FeuiSql8t0WxsZZac3rc+C2dONqhE1Jr+lHRc0bn1y3+oT7KJU2em5bWFDxtWin
KC/eU9Bc1+JEZY5PJQh1Zxjzg/b6iTaDVQzArxn1+4GKLldAnYYWBEvt2LcOYIzcW+9aqVNSfe+
8Q8AkMll4QBALrYBRVcmfga3in9gB53s30ULtO0L2bJSYAQ==";
data="U2FsdGVkX1+/eOMTgfVOEtXe5yv0u4Umjs9LtG7PCCy324k2Bxm2B9IiATXt9xcbhSODx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";
mail-complaints-to="abuse@neodome.net"
Message-ID: <617366595b7c1c800171e6066d0e9024@dizum.com>
Subject: Re: Passwords somehow showing on my C:
Date: Wed, 11 May 2022 01:58:58 +0200 (CEST)
Path: i2pn2.org!i2pn.org!news.neodome.net!mail2news
Injection-Date: Wed, 11 May 2022 00:05:01 +0000 (UTC)
From: nobody@dizum.com (Nomen Nescio)
References: <6e779a862f357648ffd647382dc507ed@dizum.com> <t5eb8v$nc3$1@dont-email.me>
Newsgroups: microsoft.public.windowsxp.general
Comments: This message did not originate from the Sender address above.
It was remailed automatically by anonymizing remailer software.
Please report problems or inappropriate use to the
remailer administrator at <abuse@dizum.com>.
Comments: This message was transferred to Usenet via mail2news gateway at
<mail2news@neodome.net>. Please send questions and concerns to
<admin@neodome.net>. Report inappropriate use to <abuse@neodome.net>.
 by: Nomen Nescio - Tue, 10 May 2022 23:58 UTC

In article <t5eb8v$nc3$1@dont-email.me>
Paul <nospam@needed.invalid> wrote:
>
> On 5/10/2022 11:48 AM, Nomen Nescio wrote:
> > Disk Investigator has shown me that some of my passwords are showing
> > on my C: drive.
> >
> > http://theabsolute.net/sware/dskinv.html
> >
> > I think their being there might be related to my sometimes
> > copy/pasting passwords into a program. I might have missed clearing
> > them from the clipboard after usage. Just guessing on that one.
> >
> > Is there a program which would allow me to erase/delete those
> > passwords?
> >
>
> The passwords would either be in a valid file, or
> the passwords could be in "white space", the space
> between files.

I left your entire post intact. Someone down the line might find it
helpful.

Be warned: I'm no tech. All I know is what I see in Disk Investigator.

> https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
>
> sdelete -z C: # 32 bit OS, clean white space on C:
> sdelete64 -z C: # 64 bit OS, clean white space on C:
> # If on some other partition, change the C:
> # to the desired drive letter.
>
> However, the minimum OS requirement is Vista on the current one.
> Why exactly, I don't know.
>
> On NTFS, small files are stored inside the $MFT itself.
> Sdelete has some mechanism to clean in those crevasses.
> The mechanism requires a second pass. The first pass,
> is bulk white space cleaning (which cannot clean $MFT).
> The second pass, cleans the small file storage area.
> Like a dinner fork, there are "spaces between tines" and
> that's what the second pass cleans. Small files, naturally,
> are used to hold passwords.
>
> https://www.trishtech.com/2010/02/permanently-delete-files-in-windows-xp/
>
> # Vista or later
> https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
>
> # 32-bit for WinXP
> https://web.archive.org/web/20101207031537/http://download.sysinternals.com/Files/SDelete.zip
>
> That's a time consuming process, so it would be nice to know
> exactly where the passwords are (inside a real file, inside
> white space where sdelete can get them).

I posted that info in my reply to R. Wieser.

> Just blindly running the cleaner, might get them.
>
> You could use nfi.exe from the roughly 2003 Microsoft package, which
> relates LBAs to file names. And that could tell you whether
> the file is inside a real file or not.
>

It was a pgp encrypted test file containing my passwords.

Somehow Win XP got the file when unencrypted.

> But your Disk Investigator should be telling you this.
> There's not much point making a fuss, unless you tell
> the customer where the item in question is. Forcing people
> to manually do maths for this job, isn't what computers
> are for.

Again, put that info in the Wieser reply.

> If Disk Investigator is not finding it in a named file...
> then Sdelete is what you want for a cleaning.
>
> Paul

You know what? Changing my passwords is simpler and surer - possibly
safer.

However, not knowing how XP did this means it wil lhappen again. How
did Windows capture the info?

Thanks for trying.

Re: Passwords somehow showing on my C:

<t5ft3s$799$1@dont-email.me>

  copy mid

https://news.novabbs.org/computers/article-flat.php?id=3282&group=microsoft.public.windowsxp.general#3282

  copy link   Newsgroups: microsoft.public.windowsxp.general
Path: i2pn2.org!i2pn.org!eternal-september.org!reader02.eternal-september.org!.POSTED!not-for-mail
From: nospam@needed.invalid (Paul)
Newsgroups: microsoft.public.windowsxp.general
Subject: Re: Passwords somehow showing on my C:
Date: Wed, 11 May 2022 04:45:47 -0400
Organization: A noiseless patient Spider
Lines: 77
Message-ID: <t5ft3s$799$1@dont-email.me>
References: <6e779a862f357648ffd647382dc507ed@dizum.com>
<t5eb8v$nc3$1@dont-email.me> <617366595b7c1c800171e6066d0e9024@dizum.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Transfer-Encoding: 7bit
Injection-Date: Wed, 11 May 2022 08:45:49 -0000 (UTC)
Injection-Info: reader02.eternal-september.org; posting-host="ae278f0c8c3a14932dbd9c8d0cba758d";
logging-data="7465"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX19AxnX/91B+dXRnPRJeVK8yGrdh8QGde4A="
User-Agent: Ratcatcher/2.0.0.25 (Windows/20130802)
Cancel-Lock: sha1:/b6IC8S79pviOlJqdJd9tiqtLTc=
In-Reply-To: <617366595b7c1c800171e6066d0e9024@dizum.com>
Content-Language: en-US
 by: Paul - Wed, 11 May 2022 08:45 UTC

On 5/10/2022 7:58 PM, Nomen Nescio wrote:
> In article <t5eb8v$nc3$1@dont-email.me>
> Paul <nospam@needed.invalid> wrote:
>
> You know what? Changing my passwords is simpler and surer - possibly
> safer.
>
> However, not knowing how XP did this means it wil lhappen again. How
> did Windows capture the info?
>
> Thanks for trying.

Utilities use temporary files in %temp%, all the time.

When Windows "deletes" a file, all it has done, is
flipped a single byte in the %MFT table. It does not
remove the cluster contents. Utilities like Recuva,
can flip the byte back.

If you were to engineer a file system to "tromp" all
over every last bit of an deleted file, that would be
non-scalable and slow.

The closest equivalent to doing that, is Heidi Eraser.

https://en.wikipedia.org/wiki/Eraser_%28software%29

It must be installed in advance of any "secret" "crypto"
type stuff.

When a %temp% file shows up, and Windows "deletes" it,
Heidi can listen to the journal and take details.
It knows what clusters to stomp on.

If you "deleted" a 10GB file, then you'd have to wait
while Heidi does 10GB of writes to clean the disk areas.
This is like Sdelete cleaning white space, the difference
is, it's happening while you are working.

Having higher speed storage devices, may help hide
the performance issues Heidi might cause.

*******

But word of warning, computers leak. Despite your best
efforts, you might still find stuff. My favorite
peeve, is if I use Windows to search for password "12345678",
then the registry record of "what I searched for"
now has "12345678" in it :-) I think you can see
the unintended comedy, of "searching for a secret",
by having the "secret" now recorded in the Registry.
Try and erase that now (bulk erase the registry).

The way to search for something, is to boot a second
OS and do the searching from there. For example, Linux
LiveDVD OSes, store working files in RAM (TMPFS) rather
than on rotating media. If I use my Linux Mint stick
without persistence, then when the stick is unplugged
after a session, nothing of what I was doing is recorded
on it.

So there are ways to improve your technique, when
doing forensics.

I did a test on sdelete, and I *did* find all sorts
of bits of my test string on the drive later. This is
all part of the "fun", is learning where the leaks
come from, and trying to figure out a way to stop
them from happening.

My guess is, a policeman is only too glad when you're
using Windows. Your dirty fingerprints will be all over
the place, and he'll be wallowing in evidence. It's not
easy to make a drive "squeaky clean", short of bulk
erasing it and removing the OS in the process.

Paul

1
server_pubkey.txt

rocksolid light 0.9.8
clearnet tor