Home » Remotely destroy all the data from a laptop having windows? [closed]

Remotely destroy all the data from a laptop having windows? [closed]

Solutons:


Remotely destroying all data on a laptop is reasonably easy to do thoroughly, with an EMP. It is somewhat messy, though; there is collateral damage.

If you want something more “surgical”, you can destroy data remotely, subject to the following caveats:

  1. You have to be able to remotely log on the machine. This can use RDP or some custom remote-control server such as OpenSSH. In any case, this requires some pre-configuration on the system itself, because a normal, freshly installed Windows disallows remote control. If your machine has already been stolen, then that’s too late for that. Alternatively, hack into the machine using a known vulnerability, assuming that there is a known vulnerability in the machine (but then, why did you not patch it while it was in your possession ?).

  2. From the machine itself, you can delete files, but to really destroy the data, you have to overwrite the sectors, not merely cease to reference them from the filesystem structures. There is some debate as to the effectiveness of such “data erasure”, and it depends on the disk technology; SSD are likely to require a specific approach.

  3. To really wipe out everything on the machine, you have to take care of temporary files (possibly temporary files which have already been deleted, but not overwritten) and virtual memory files. It can be difficult to force the live machine to destroy all traces. You can begin by filling the disk up with files containing random junk, to force an overwrite of all free sectors. You can do the same with virtual memory by making a program which allocates as much RAM as possible, there again filling it with random bytes.

    To be really thorough, you might want to install a specific OS on the disk, which boots in a RAM disk, then wipes out the hard drive entirely, from first to last sector. This is a one-shot “forced suicide” so it might be hard to pull off remotely (do it or do it not, but there is no try).

As was pointed out, disk encryption can make this “wiping out” a moot point, so if you fear that your laptop may be stolen (but is still in your possession now), then you can install TrueCrypt with full-system encryption. Typing the password is then necessary to boot the machine up, and make sense of any byte which is on the disk. Therefore, assuming the laptop is shut down, not merely “sleeping” or “hibernating” at the time it is stolen, the data is safe and no longer requires any form of “remote deletion”.

You could encrypt the whole disk with TrueCrypt and a very long key, leaving only random data when shut down. But that’s a workaround, as data stays and could be read a few years later when a smart guy finds a flaw in the encryption algorithm…

format c: ?

Related Solutions

How can I use environment variables in Nginx.conf

From the official Nginx docker file: Using environment variables in nginx configuration: Out-of-the-box, Nginx doesn't support using environment variables inside most configuration blocks. But envsubst may be used as a workaround if you need to generate your...

Difference between .bashrc and .bash_profile

Traditionally, when you log into a Unix system, the system would start one program for you. That program is a shell, i.e., a program designed to start other programs. It's a command line shell: you start another program by typing its name. The default shell, a...

Custom query with Castle ActiveRecord

In this case what you want is HqlBasedQuery. Your query will be a projection, so what you'll get back will be an ArrayList of tuples containing the results (the content of each element of the ArrayList will depend on the query, but for more than one value will...

What is the “You have new mail” message in Linux/UNIX?

Where is this mail? It's likely to be in the spool file: /var/mail/$USER or /var/spool/mail/$USER are the most common locations on Linux and BSD. (Other locations are possible – check if $MAIL is set – but by default, the system only informs you about...

How can I find the implementations of Linux kernel system calls?

System calls aren't handled like regular function calls. It takes special code to make the transition from user space to kernel space, basically a bit of inline assembly code injected into your program at the call site. The kernel side code that "catches" the...

Is a composite index also good for queries on the first field?

It certainly is. We discussed that in great detail under this related question: Working of indexes in PostgreSQL Space is allocated in multiples of MAXALIGN, which is typically 8 bytes on a 64-bit OS or (much less common) 4 bytes on a 32-bit OS. If you are not...

Explaining computational complexity theory

Hoooo, doctoral comp flashback. Okay, here goes. We start with the idea of a decision problem, a problem for which an algorithm can always answer "yes" or "no." We also need the idea of two models of computer (Turing machine, really): deterministic and...

Building a multi-level menu for umbraco

First off, no need pass the a parent parameter around. The context will transport this information. Here is the XSL stylesheet that should solve your problem: <!-- update this variable on how deep your menu should be --> <xsl:variable...

How to generate a random string?

My favorite way to do it is by using /dev/urandom together with tr to delete unwanted characters. For instance, to get only digits and letters: tr -dc A-Za-z0-9 </dev/urandom | head -c 13 ; echo '' Alternatively, to include more characters from the OWASP...

How to copy a file from a remote server to a local machine?

The syntax for scp is: If you are on the computer from which you want to send file to a remote computer: scp /file/to/send username@remote:/where/to/put Here the remote can be a FQDN or an IP address. On the other hand if you are on the computer wanting to...

What is the difference between curl and wget?

The main differences are: wget's major strong side compared to curl is its ability to download recursively. wget is command line only. There's no lib or anything, but curl's features are powered by libcurl. curl supports FTP, FTPS, HTTP, HTTPS, SCP, SFTP, TFTP,...

Using ‘sed’ to find and replace [duplicate]

sed is the stream editor, in that you can use | (pipe) to send standard streams (STDIN and STDOUT specifically) through sed and alter them programmatically on the fly, making it a handy tool in the Unix philosophy tradition; but can edit files directly, too,...

How do I loop through only directories in bash?

You can specify a slash at the end to match only directories: for d in */ ; do echo "$d" done If you want to exclude symlinks, use a test to continue the loop if the current entry is a link. You need to remove the trailing slash from the name in order for -L to...

How to clear journalctl

The self maintenance method is to vacuum the logs by size or time. Retain only the past two days: journalctl --vacuum-time=2d Retain only the past 500 MB: journalctl --vacuum-size=500M man journalctl for more information. You don't typically clear the journal...

How can I run a command which will survive terminal close?

One of the following 2 should work: $ nohup redshift & or $ redshift & $ disown See the following for a bit more information on how this works: man nohup help disown Difference between nohup, disown and & (be sure to read the comments too) If your...