Feeds

Clearing swap and hibernation files properly

Two neglected open books

  • alert
  • submit to reddit

Protecting users from Firesheep and other Sidejacking attacks with SSL

Sensitive data asleep

Now for hibernation, or suspend-to-disk, on Windows 2K and XP. Enabled by default on XP, this gimmick takes a snapshot of memory and writes it to disk so your computer can hibernate and "wake up" more quickly than it could from a dead stop. In practice, it's not that much help, and few users express much enthusiasm for it. So its benefits are questionable, while it poses a serious challenge to good data hygiene. The size of the corresponding hidden file, called hiberfil.sys, will roughly match the amount of RAM on the system.

Naturally, an incredible amount of sensitive data could be dumped to disk when hibernation is activated. So if you're at all concerned about privacy and data hygiene, this file has to go, and the area it occupies has to be wiped properly.

1. Begin by disabling hibernation. Go to Control Panel ==> Power Options, to launch the Power Options Properties dialogue box. Select the tab labelled "Hibernate", and clear the tick-box beside the option, "Enable hibernation". Click the Apply button, close the dialogue box, and reboot your machine.

2. Next, open Windows Explorer and navigate to the root directory, i.e., My Computer ==> Local Disk (C:). Look for hiberfil.sys, and delete it if it's present. Now, empty your Recycle Bin.

3. Finally, perform a secure wipe of your disk's free space and file slack space.

As far as I know, current Linux distros do not hibernate or suspend-to-disk by default, although a user can implement it using the swap partition as the hibernate file. In that case you would need a swap partition about twice the size of system RAM, and you will have to recompile your kernel, as certain features need to be built in to the kernel, rather than being loaded as modules. But clearing hibernation data properly is as easy as running the WipeSwap.sh script as described previously.

So once again, when it comes to privacy and security, Linux users have it a lot easier than Windows users. And cheaper, too. ®

The next step in data security

More from The Register

next story
Israeli spies rebel over mass-snooping on innocent Palestinians
'Disciplinary treatment will be sharp and clear' vow spy-chiefs
Infosec geniuses hack a Canon PRINTER and install DOOM
Internet of Stuff securo-cockups strike yet again
THREE QUARTERS of Android mobes open to web page spy bug
Metasploit module gobbles KitKat SOP slop
'Speargun' program is fantasy, says cable operator
We just might notice if you cut our cables
Apple Pay is a tidy payday for Apple with 0.15% cut, sources say
Cupertino slurps 15 cents from every $100 purchase
YouTube, Amazon and Yahoo! caught in malvertising mess
Cisco says 'Kyle and Stan' attack is spreading through compromised ad networks
Hackers pop Brazil newspaper to root home routers
Step One: try default passwords. Step Two: Repeat Step One until success
Greater dev access to iOS 8 will put us AT RISK from HACKERS
Knocking holes in Apple's walled garden could backfire, says securo-chap
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.