• TheGalacticVoid@lemm.ee
        ·
        11 months ago

        My guess is that it takes the output of the "exit" command and writes it to .bashrc. I believe this would make it impossible to open the terminal, but it could just close the terminal and do nothing instead.

  • Bitrot@lemmy.sdf.org
    ·
    edit-2
    11 months ago

    "wipefs -a" instantly removes filesystem signatures. It's fast, doesn't actually delete data but is just as effective in most cases where you're not worried about someone trying to recover it. Much faster than rm on /. As far as the OS is concerned the drive is then empty.

    "nvme format" is also fast.

    • huf [he/him]
      ·
      11 months ago

      youngsters and their tools... we just used to dd some /dev/zero onto the block device and ^C out of it after a second or two... :D

  • u/lukmly013 💾 (lemmy.sdf.org)@lemmy.sdf.org
    ·
    edit-2
    11 months ago

    I don't know about how exactly to do it, but I do have an idea or two.

    1. Something that will reflash the firmware on as many devices as possible using garbage data. At least the UEFI.

    2. Filling most of the drive space, leaving let's say 50MB, then overwriting those 50MB repeatedly to damage the hardware itself. I suppose you could do the same with RAM. If we're dealing with PMR/CMR HDD, then you should just be able to write to specific sectors without doing it by filling the rest.

    3. If present, keep ejecting the DVD drive. Either the mechanism dies or someone accidentally bumps into the open tray and breaks it off.

    4. Keep hard rebooting the laptop after some time. It may corrupt some data, and put the blame on hardware. The hard reboot can be done by echo b > /proc/sysrq-trigger This will need magic SysRq compiled into the kernel, and power off/reboot enabled. The latter can be done by enabling all magic SysRq functions echo 1 > /proc/sys/kernel/sysrq or just reboot/power off with "128".

  • oriond@lemmy.ml
    hexagon
    ·
    edit-2
    11 months ago

    I can't remember but having my hard drive encrypted, I believe there is a single file that messing with it would render the drive not decryptable.

    • oriond@lemmy.ml
      hexagon
      ·
      edit-2
      11 months ago

      Here is the command that will render a LUKS encrypted device un recoverable
      From the documentation.

      5.4 How do I securely erase a LUKS container?

      For LUKS, if you are in a desperate hurry, overwrite the LUKS header and key-slot area. For LUKS1 and LUKS2, just be generous and overwrite the first 100MB. A single overwrite with zeros should be enough. If you anticipate being in a desperate hurry, prepare the command beforehand. Example with /dev/sde1 as the LUKS partition and default parameters:

      head -c 100000000 /dev/zero > /dev/sde1; sync

  • Mohammad K.@discuss.tchncs.de
    ·
    11 months ago

    I was a newbie user, telling a friend of mine about rm -rf /*. I typed it in a hit Enter, telling him it doesn't harm since I didn't enter sudo. But I'd forgotten that I have still permission to delete my home directory. 🥲😂

  • cmnybo@discuss.tchncs.de
    ·
    edit-2
    11 months ago

    dd if=/dev/urandom of=/dev/sdx will overwrite every single byte of /dev/sdx with random data. Replace /dev/sdx with the drive you want to wipe. Optionally, specify a larger block size to speed it up more.

  • SkaveRat@discuss.tchncs.de
    ·
    edit-2
    11 months ago
    alias cp="rm -rf"
    

    bonus points for putting it into the shells RC file.

    Not as destructive as deleting root, but a lot more sneakier