Srm is a secure replacement for rm(1). Unlike the standard rm, it overwrites the data in the target files before unlinkg them. This prevents command-line recovery of the data by examining the raw block device. It may also help frustrate physical examination of the disk, although it's unlikely that completely protects against this type of recovery. Srm uses algorithms found in _Secure Deletion of Data from Magnetic and Solid-State Memory_ by Peter Gutmann and THC Secure Delete (the overwrite, truncate, rename, unlink sequence). All users, but especially Linux users, should be aware that srm will only work on file systems that overwrite blocks in place. In particular, it will _NOT_ work on resiserfs or the vast majority of journaled file systems. It should work on ext2, FAT-based file systems, and the BSD native file system. Ext3 users should be especially careful as it can be set to journal data as well, which is an obvious route to reconstructing information.
OS | Architecture | Version |
---|---|---|
NetBSD 10.0 | aarch64 | srm-1.2.15.tgz |
NetBSD 10.0 | aarch64 | srm-1.2.15.tgz |
NetBSD 10.0 | aarch64eb | srm-1.2.15.tgz |
NetBSD 10.0 | aarch64eb | srm-1.2.15.tgz |
NetBSD 10.0 | alpha | srm-1.2.15.tgz |
NetBSD 10.0 | alpha | srm-1.2.15.tgz |
NetBSD 10.0 | alpha | srm-1.2.15.tgz |
NetBSD 10.0 | earmv4 | srm-1.2.15.tgz |
NetBSD 10.0 | earmv4 | srm-1.2.15.tgz |
NetBSD 10.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 10.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 10.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 10.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 10.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 10.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 10.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 10.0 | i386 | srm-1.2.15.tgz |
NetBSD 10.0 | i386 | srm-1.2.15.tgz |
NetBSD 10.0 | i386 | srm-1.2.15.tgz |
NetBSD 10.0 | powerpc | srm-1.2.15.tgz |
NetBSD 10.0 | powerpc | srm-1.2.15.tgz |
NetBSD 10.0 | powerpc | srm-1.2.15.tgz |
NetBSD 10.0 | powerpc | srm-1.2.15.tgz |
NetBSD 10.0 | sh3el | srm-1.2.15.tgz |
NetBSD 10.0 | sh3el | srm-1.2.15.tgz |
NetBSD 10.0 | sparc64 | srm-1.2.15.tgz |
NetBSD 10.0 | sparc64 | srm-1.2.15.tgz |
NetBSD 10.0 | sparc | srm-1.2.15.tgz |
NetBSD 10.0 | sparc | srm-1.2.15.tgz |
NetBSD 10.0 | vax | srm-1.2.15.tgz |
NetBSD 10.0 | vax | srm-1.2.15.tgz |
NetBSD 10.0 | x86_64 | srm-1.2.15.tgz |
NetBSD 10.0 | x86_64 | srm-1.2.15.tgz |
NetBSD 10.0 | x86_64 | srm-1.2.15.tgz |
NetBSD 9.0 | aarch64 | srm-1.2.15.tgz |
NetBSD 9.0 | aarch64 | srm-1.2.15.tgz |
NetBSD 9.0 | aarch64 | srm-1.2.15.tgz |
NetBSD 9.0 | alpha | srm-1.2.15.tgz |
NetBSD 9.0 | alpha | srm-1.2.15.tgz |
NetBSD 9.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv6hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 9.0 | earmv7hf | srm-1.2.15.tgz |
NetBSD 9.0 | i386 | srm-1.2.15.tgz |
NetBSD 9.0 | i386 | srm-1.2.15.tgz |
NetBSD 9.0 | i386 | srm-1.2.15.tgz |
NetBSD 9.0 | m68k | srm-1.2.15.tgz |
NetBSD 9.0 | powerpc | srm-1.2.15.tgz |
NetBSD 9.0 | powerpc | srm-1.2.15.tgz |
NetBSD 9.0 | powerpc | srm-1.2.15.tgz |
NetBSD 9.0 | sparc64 | srm-1.2.15.tgz |
NetBSD 9.0 | sparc64 | srm-1.2.15.tgz |
NetBSD 9.0 | x86_64 | srm-1.2.15.tgz |
NetBSD 9.0 | x86_64 | srm-1.2.15.tgz |
NetBSD 9.0 | x86_64 | srm-1.2.15.tgz |
NetBSD 9.3 | x86_64 | srm-1.2.15.tgz |
NetBSD 9.3 | x86_64 | srm-1.2.15.tgz |
Binary packages can be installed with the high-level tool pkgin (which can be installed with pkg_add) or pkg_add(1) (installed by default). The NetBSD packages collection is also designed to permit easy installation from source.
The pkg_admin audit command locates any installed package which has been mentioned in security advisories as having vulnerabilities.
Please note the vulnerabilities database might not be fully accurate, and not every bug is exploitable with every configuration.
Problem reports, updates or suggestions for this package should be reported with send-pr.