Is there a program which would allow me to erase/delete
those passwords?
Disk Investigator has shown me that some of my passwords are showing
on my C: drive.
http://theabsolute.net/sware/dskinv.html
I think their being there might be related to my sometimes
copy/pasting passwords into a program. I might have missed clearing
them from the clipboard after usage. Just guessing on that one.
Is there a program which would allow me to erase/delete those
passwords?
On 5/10/2022 11:48 AM, Nomen Nescio wrote:
Disk Investigator has shown me that some of my passwords are showing
on my C: drive.
http://theabsolute.net/sware/dskinv.html
I think their being there might be related to my sometimes
copy/pasting passwords into a program. I might have missed clearing
them from the clipboard after usage. Just guessing on that one.
Is there a program which would allow me to erase/delete those
passwords?
The passwords would either be in a valid file, or
the passwords could be in "white space", the space
between files.
https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
sdelete -z C: # 32 bit OS, clean white space on C:
sdelete64 -z C: # 64 bit OS, clean white space on C:
# If on some other partition, change
the C:
# to the desired drive letter.
However, the minimum OS requirement is Vista on the current one.
Why exactly, I don't know.
On NTFS, small files are stored inside the $MFT itself.
Sdelete has some mechanism to clean in those crevasses.
The mechanism requires a second pass. The first pass,
is bulk white space cleaning (which cannot clean $MFT).
The second pass, cleans the small file storage area.
Like a dinner fork, there are "spaces between tines" and
that's what the second pass cleans. Small files, naturally,
are used to hold passwords.
https://www.trishtech.com/2010/02/permanently-delete-files-in-windows-xp/
# Vista or later
https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
# 32-bit for WinXP
https://web.archive.org/web/20101207031537/http://download.sysinternals.com/Files/SDelete.zip
That's a time consuming process, so it would be nice to know
exactly where the passwords are (inside a real file, inside
white space where sdelete can get them).
Just blindly running the cleaner, might get them.
You could use nfi.exe from the roughly 2003 Microsoft package, which
relates LBAs to file names. And that could tell you whether
the file is inside a real file or not.
But your Disk Investigator should be telling you this.
There's not much point making a fuss, unless you tell
the customer where the item in question is. Forcing people
to manually do maths for this job, isn't what computers
are for.
If Disk Investigator is not finding it in a named file...
then Sdelete is what you want for a cleaning.
Paul
What is suggested app to look at "white Space" and see what is there ?
On 5/10/2022 11:48 AM, Nomen Nescio wrote:
Disk Investigator has shown me that some of my passwords are showing
on my C: drive.
http://theabsolute.net/sware/dskinv.html
I think their being there might be related to my sometimes
copy/pasting passwords into a program. I might have missed clearing
them from the clipboard after usage. Just guessing on that one.
Is there a program which would allow me to erase/delete those
passwords?
The passwords would either be in a valid file, or
the passwords could be in "white space", the space
between files.
https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
sdelete -z C: # 32 bit OS, clean white space on C:
sdelete64 -z C: # 64 bit OS, clean white space on C:
# If on some other partition, change the C:
# to the desired drive letter.
However, the minimum OS requirement is Vista on the current one.
Why exactly, I don't know.
On NTFS, small files are stored inside the $MFT itself.
Sdelete has some mechanism to clean in those crevasses.
The mechanism requires a second pass. The first pass,
is bulk white space cleaning (which cannot clean $MFT).
The second pass, cleans the small file storage area.
Like a dinner fork, there are "spaces between tines" and
that's what the second pass cleans. Small files, naturally,
are used to hold passwords.
https://www.trishtech.com/2010/02/permanently-delete-files-in-windows-xp/
# Vista or later
https://docs.microsoft.com/en-us/sysinternals/downloads/sdelete
# 32-bit for WinXP
https://web.archive.org/web/20101207031537/http://download.sysinternals.com/Files/SDelete.zip
That's a time consuming process, so it would be nice to know
exactly where the passwords are (inside a real file, inside
white space where sdelete can get them).
Just blindly running the cleaner, might get them.
You could use nfi.exe from the roughly 2003 Microsoft package, which
relates LBAs to file names. And that could tell you whether
the file is inside a real file or not.
But your Disk Investigator should be telling you this.
There's not much point making a fuss, unless you tell
the customer where the item in question is. Forcing people
to manually do maths for this job, isn't what computers
are for.
If Disk Investigator is not finding it in a named file...
then Sdelete is what you want for a cleaning.
Paul
In article <t5eb8v$nc3$1@dont-email.me>
Paul <nospam@needed.invalid> wrote:
You know what? Changing my passwords is simpler and surer - possibly
safer.
However, not knowing how XP did this means it wil lhappen again. How
did Windows capture the info?
Thanks for trying.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 300 |
Nodes: | 16 (2 / 14) |
Uptime: | 97:36:39 |
Calls: | 6,699 |
Calls today: | 4 |
Files: | 12,232 |
Messages: | 5,349,455 |