textfiles/virus/DOCUMENTATION/overite.txt
2021-04-15 13:31:59 -05:00

215 lines
9.6 KiB
Plaintext
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

ロロロロロロサ ロロサ ロロサ ロロロロロサ ロロサ ロロロロロロサ ロロロロロロサ ロロロサ ロロサ
ロロノヘヘロロサ ロロコ ロロコ ロロノヘヘロロサ ロロコ ロロノヘヘヘヘシ ロロノヘヘヘロロサ ロロロロサ ロロコ
ロロロロロロノシ ロロロロロロロコ ロロロロロロロコ ロロコ ロロコ ロロコ ロロコ ロロノロロサ ロロコ
ロロノヘヘヘシ ロロノヘヘロロコ ロロノヘヘロロコ ロロコ ロロコ ロロコ ロロコ ロロコネロロサロロコ
ロロコ ロロコ ロロコ ロロコ ロロコ ロロロロロロロサ ネロロロロロロサ ネロロロロロロノシ ロロコ ネロロロロコ
ネヘシ ネヘシ ネヘシ ネヘシ ネヘシ ネヘヘヘヘヘヘシ ネヘヘヘヘヘシ ネヘヘヘヘヘシ ネヘシ ネヘヘヘシ
ロロサ ロロロロロロロサ ロロサ ロロサ ロロサ ロロロロロロロサ ロロロサ ロロロサ
ロロノシ ロロノヘヘヘヘシ ロロコ ロロノシ ロロコ ロロノヘヘヘヘシ ロロロロサ ロロロロコ
ロロノシ ロロロロロロロサ ロロロロロノシ ロロコ ロロロロロロロサ ロロノロロロロノロロコ
ロロノシ ネヘヘヘヘロロコ ロロノヘロロサ ロロコ ネヘヘヘヘロロコ ロロコネロロノシロロコ
ロロノシ ロロロロロロロコ ロロコ ロロサ ロロコ ロロロロロロロコ ロロコ ネヘシ ロロコ
ネヘシ ネヘヘヘヘヘヘシ ネヘシ ネヘシ ネヘシ ネヘヘヘヘヘヘシ ネヘシ ネヘシ
Presents...
ワロロロロロロロワ ワロロワ ワロロワ ワロロロロロロロロロワ ワロロロロロロロロワ ワロワ ワロロロロロロロロロロワ ワロロロロロロロロロワ
ロロロロ゚゚゚ロロロロ ロロロロ ロロロロ ロロロロ ゚゚゚ ロロロ゚ ゚ロロロ ロロロロロ ゚゚゚゚ロロロロ゚゚゚゚ ロロロロ ゚゚゚
ロロロ ロロロ ロロロロ ロロロロ ロロロロワワワワワ ロロロワ ワロロロ ロロロロロ ロロロロ ロロロロワワワワワ
ロロロ ロロロ ゚ロロロワ ワロロロ゚ ロロロロ゚゚゚゚゚ ロロロロロロロロロ゚ ロロロロロ ロロロロ ロロロロ゚゚゚゚゚
ロロロロワワワロロロロ ゚ロロロロロロロ゚ ロロロロ ワワワ ロロロロ ゚ロロロロワ ロロロロロ ロロロロ ロロロロ ワワワ
゚ロロロロロロロ゚ ゚ロロロ゚ ゚ロロロロロロロロロ゚ ゚ロロ゚ ゚ロロ゚ ゚ロ゚ ゚ロロ゚ ゚ロロロロロロロロロ゚
The Ultimate Utility for 100% Reliable Data Security
Version 1.0
Written By
ロロロロロロワ ワロロロロロロ ワロロロロロワ ゙ロロン ワロロロロロロワ ワロロロロロワ ロロロロロロロ ワロロロロロワ ロロロロロロワ
ロロ ロロ ロロワワワワ ロロ ロロ ロロ ロロ ロロ ロロワワワロロ ゙ロン ロロ ロロ ロロ ロロ
ロロ ロロ ロロ゚゚゚゚ ロロ ロロ ロロ ロロ ロロ ロロ゚゚゚ロロ ゙ロン ロロ ロロ ロロロロロロ
ロロロロロロ゚ ゚ロロロロロロ ゚ロロロロロ゚ ゙ロロン ロロ ロロ ロロ ロロ ロロ ゙ロン ゚ロロロロロ゚ ロロ ゚ロロ
Phalcon/Skism
Dedicated to Laura
About this program:
-------------------
Every hacker has something lying around on his computer that he doesn't
want anyone else to see. It could be the cracked password file for a local
college Unix, or it could be a collection of the CORE newsletters. Maybe
it's nothing more incriminating than his secret PGP keyring. Whatever it
is, it's something he wants to keep secret. Absolutely, 100% secret. In
most cases, that secrecy can be obtained through encryption. However, some
days, encryption just isn't enough, and the information has to be destroyed.
Fast. Reliably. And without drawing a lot of attention from "visitors".
There have been many programs written to overwrite files for security
purposes, but none that I've ever seen were really suited to the purpose of
nuking data secretly, quickly, and with no human interaction. So, I sat
down and wrote OveRite. What makes this one so different? See for yourself:
Features:
---------
<20> SPEED! OveRite uses a buffer size of 64k to overwrite files. This
means fewer writes per file, which means VERY FAST wiping.
(On my 15ms IDE cached drive, it took out a 500k file in about 2
seconds - and 1 meg in 77 different files in under 10 seconds)
<20> PRE-DETERMINED TARGET FILE LIST: OveRite has the unique ability to
read in a textfile which contains the pathnames (including wildcards)
for any number of files to wipe. You can create a list of files or
directories you want wiped, and OveRite will do each one in turn.
This allows OveRite to nuke all the files you want wiped in one fell
swoop, which speeds things up quite a bit.
<20> MULTIPLE PASSES - You can specify the number of times you want OveRite
to overwrite each file. One time is usually sufficient for most
purposes, but you can specify 2,3,10, or even 1000 passes per file. Of
course, multiple passes slow things down a bit, but provide better
security.
<20> DEPT. OF DEFENSE WIPE - OveRite will wipe files to the standard set up
by the D.O.D. - That is, it will write all 1's, then all 0's,
repeating this process 3 times. Then, it will write the + symbol
once. The D.O.D. specs state that this last write should be verified,
however I opted to eliminate that specification, for speed reasons.
If there WAS an error during the write, you'll be told. Verification
isn't necessary, in my opinion. BTW - 7 passes - this slows things
down quite a bit!
<20> DELETION/TRUNCATION OPTIONS - By default, OveRite will truncate and
delete each file it wipes. However, there are command line options
to specify No Deletion, or No Truncation, if that's what you prefer.
<20> SUPRESSED SCREEN OUTPUT - OveRite was written so it would provide as
much, or as little screen output as you want. Let's face it - if you
hear a knock at the door, and see a few guys in suits out front, you
want to nuke data without advertising that you're doing it. OveRite
gives you the option of turning off ALL screen output (except error
messages) for those times when you'd rather not make a scene.
<20> NO INPUT NEEDED - Unlike Norton's WipeInfo, OveRite doesn't require
user keypresses for wiping files. It's made to be used in batch
files, or standalone. Of course, OveRite can be set to ask for
confirmation before wiping files. The default, however, is NOT to
ask, and just wipe. Therefore, be a bit careful. There is no
recovering from OveRite.
<20> WIPE CHARACTER SELECTION - Users can use the /C option to choose the
character they'd like to overwrite files with. It really doesn't make
much of a difference which character is used, but what the heck, I
figured I had to add at least one /<-/>/\/) feature... The default
character is '0'.
Using OveRite:
--------------
OveRite is easy to use. It's 100% command line driven. The syntax for
OveRite is:
OveRite <options> <filespec>
Examples:
OveRite C:\SECRET\*.* would overwrite and delete all files in C:\SECRET
OveRite /N /C:X *.* would overwrite all files in the current directory,
with the character 'X'. The overwritten files
would NOT be deleted.
OveRite /F:TARGETS.TXT C:\DOS\*.EXE would first wipe out all the .EXE
files in the C:\DOS directory, and would then
beging reading TARGET.TXT, and overwriting each
file listed in TARGET.TXT.
OveRite C:\*.* /A would ask for confirmation before overwriting all
the files in the root directory of drive C:
OveRite /H would display a help file.
(The options and filespecs can be given in any order on the command
line, and are NOT case sensitive. -A, /A, -a, and /a are all valid as
option formats)
Simply typing OveRite and pressing <ENTER> will display a help screen.
The options for OveRite are as follows:
/C:<character> - Overwrite files with <character>
/F:<target file list> - specify list of files to overwrite
/V - Toggle verbose mode off, to suppress all screen output
/A - ask user for confirmation before beginning overwriting process
/T - do NOT truncate files after overwriting them
/N - do NOT delete files after overwriting them
/P:<passes> - Overwrite files <passes> number of times
/D - Overwrite files to modified Dept. of Defense specifications (7 passes)
By default, OveRite will overwrite files with '0's, and will only make
one pass per file. It will then truncate and delete the files. Verbose
mode is on, by default, and confirmation mode is OFF. DOD mode is NOT
turned on by default.
Additional Information:
-----------------------
OveRite is meant for SPEED, and the fast, reliable destruction of
sensitive data. Although is IS technically possible to recover data which
has been overwritten, through the use of extremely expensive data recovery
technology, it is safe to say that overwriting data is enough to protect it
from just about all prying eyes. There is a company in Eurpoe which claims
they can retrieve data which has been overwritten up to 20 times. I don't
doubt this, but I DO doubt the accuracy with which they do it. It is also
safe to say that they are one of the FEW companies in the world with this
technology. The local police departments surely won't have a way of
recovering, and I doubt that any other law enforcement agency would be
willing to do to the great expense and trouble of recovering overwritten
data. It's not worth the time or the money, in most cases. For all
practical purposes, OveRite will completely, irreversibly destroy your
sensitive information. Period.
Tech Notes:
-----------
OveRite was written in Turbo Pascal 7.0, and uses a 64k buffer to
overwrite files with. All the available memory (up to 64k) is used, with a
call to the GetMem procedure, and this area of memory is filled with the
character which is to be written over files. A loop using the BlockWrite
procedure writes over 64k of the target file at once. This greatly enhances
speed. If 64k of heap memory isn't available, overwrite uses the MaxAvail
amount of RAM for the buffer. Source code to the OveRite program may be
made available at a later time, if I feel like it.
--DecimatoR
Phalcon/Skism Programming
May, 1993
"Phalcon/Skism - coming soon to a system near you"