for the terminal’s operating system
for the terminal’s operating system
Here is the command that will render a LUKS encrypted device un recoverable
From the documentation.
5.4 How do I securely erase a LUKS container?
For LUKS, if you are in a desperate hurry, overwrite the LUKS header and key-slot area. For LUKS1 and LUKS2, just be generous and overwrite the first 100MB. A single overwrite with zeros should be enough. If you anticipate being in a desperate hurry, prepare the command beforehand. Example with /dev/sde1 as the LUKS partition and default parameters:
head -c 100000000 /dev/zero > /dev/sde1; sync
I think in these days, rm will warn you if you do a
rm -rf /
What does this do? nobody can read any file? would sudo chmod 777 fix it at least to a usable system?
I met a wonderful woman. We are dating now
I can’t remember but having my hard drive encrypted, I believe there is a single file that messing with it would render the drive not decryptable.
1.- I will start with the infamous
rm-rf /
The US military is there to protect their country’s “Freedom”
I love the big and supportive community and the rolling release model.
Also lots of software between the official Repos and the AUR
1.- Make your computer slower and slower every year for no real reason. 2.- Get your files virus infected for not using an antivirus software. 3.- To be fair, get some really cool games.