dslreports logo
site
 
    All Forums Hot Topics Gallery
spc

spacer




how-to block ads


Search Topic:
uniqs
616
share rss forum feed


swtnoob

@optonline.net

Dban?

this person claims it set a password for the hdd...uhmmm???

»sourceforge.net/projects/dban/fo···11008618



swtnoob

@optonline.net

anyone can offer advice from a security perspective....


TheMG
Premium
join:2007-09-04
Canada
kudos:3
Reviews:
·NorthWest Tel
reply to swtnoob

Either something f'd up when the user shut off the computer during the process, or there is some kind of firmware bug that was triggered. That's the only way I can see this is possible.

Normally, the hard drive password is stored on the hard drive itself in a protected memory area which would be inaccessible to DBAN.

FWIW I've used DBAN on several laptops and have never run into such a problem.



finnanon

@dnainternet.fi
reply to swtnoob

Short story: He has propably used ATA command called "secure wipe". That uses hdd ATA specs/feature, that sets the drive to wipe itself.

Long story: When you set ATA password, you can unlock it only by either typing the ATA password or using ATA secure wipe command to wipe the entire hdd. If you interrupt that progress, it will continue to ask password and continue to wipe the drive if none is given. This feature is set so that you could not simply reset the ATA password, but only to do so by first wiping the entire hdd.

ATA passwords are no means secure way to protect hdd, but they do keep out most criminals from accessing the content of hdd. Some BIOS support ATA security commands, most dont.