Outline for April 9, 2007
Question:
Two MIT graduate students bought a number of used hard drives on E-Bay and analyzed them. They were able to recover lots of files, including files containing very personal information (such as medical records), and in some cases even restore the operating system of the computer to which the hard drive belonged. Some of these disks had simply been discarded, but others had files deleted, or were reformatted--and still the students could recover the files! As you will see, there is a simple way to prevent this. Why do you think the original owners of the disks did not use it? What might be done to encourage people and corporations who have sensitive data such as medical records to erase their disks securely before selling them?
-
Greetings and felicitations!
-
Prospectus due in class today, before you leave
-
Lab exercise 2 avalable on class web sites
-
How a computer knows what to do
-
Instructions
-
Move instructions
-
Arithmetic instructions (add, subtract)
-
Branching instructions
-
Other instructions
-
How the computer does it
-
Fetch instruction from location given by program counter
-
Increment program counter
-
Decode instruction into operation code (opcode), addresses, other information
-
Execute instruction, using addresses and other information as needed
-
Fetch next instruction and repeat
-
How a disk stores data
-
Boot block
-
Disk space: cylinders, tracks, sectors or blocks; sectors grouped into clusters; free list
-
Superblock or disk map
-
Inode table, FAT, or VFAT; file, directory attributes
Here is a PDF version of this document.