[Fed-Talk] Documentation of Tiger security features
[Fed-Talk] Documentation of Tiger security features
- Subject: [Fed-Talk] Documentation of Tiger security features
- From: Harry Heaton <email@hidden>
- Date: Mon, 18 Jul 2005 12:04:46 -0400
I am writing a standard practices document need to better understand
some of the new OS-X 10.4 security features. Can anyone point to
current documentation (Apple's developer site seems to be stuck on
10.3 security documents) on:
1) "Use secure virtual memory" checkbox on Filevault: How exactly is
this implemented? Are application temp files encrypted?
2) Disk Utility options:
-- overwrite patterns used for 7x and 35x over-write for disk
erasure
-- overwrite patterns and free-space logic for "erase free space"
For example, if I were to delete a mail file from Apple's Mail
client, then run "erase free space" in disk utility, would the file
be recoverable by forensics?
HHH
Harry H. Heaton III, Senior Scientist
Science Applications International Corp.
4031 Colonel Glenn Highway
Beavercreek, OH 45431
Voice: 937.431.2324
Fax: 937.431.2288
_______________________________________________
Do not post admin requests to the list. They will be ignored.
Fed-talk mailing list (email@hidden)
Help/Unsubscribe/Update your Subscription:
This email sent to email@hidden