[cctalk] Re: Floppy recovery

2023-06-21 Thread Chuck Guzis via cctalk
On 6/21/23 01:50, Christian Corti via cctalk wrote:
> On Tue, 20 Jun 2023, Chuck Guzis wrote:
>> the cookie to a clean jacket after cleaning.  If it's oxide shedding, I
>> use a couple of drops of cyclomethicone on each side.
> 
> Is it essentially the same as silicone oil? Because cyclomethicone is
> just a category for three different cyclic siloxanes (D4, D5 and D6),
> namely cyclotetrasiloxane, cyclopentasiloxane and cyclohexasiloxane.
> D4 and D5 have been put on the ECHA list of forbidden substances in 2018.
> So, what exactly do you use? ;-)

This stuff:

https://pubchem.ncbi.nlm.nih.gov/compound/Decamethylcyclopentasiloxane

The ECHA documents are linked.  As far as I can determine, use has been
restricted, not forbidden in the ECHA.  The cosmetics industry would
likely go bankrupt without it.

I'm not suggesting that anyone drink it or bathe in it (although it is
used in many shampoos), but then, neither am I suggesting people bathe
in petrol either, although it's useful and carcinogenic.

Manufacturing data shows that at least a hundred million tons of the
stuff is manufactured yearly.

I use it on disks and tapes because it's a lubricant that's both
chemically inert and volatile; that is, after using, it evaporates and
leaves the medium unaffected.

Make your own decisions.

--Chuck




[cctalk] Re: Floppy recovery

2023-06-21 Thread Christian Corti via cctalk

On Tue, 20 Jun 2023, Chuck Guzis wrote:

the cookie to a clean jacket after cleaning.  If it's oxide shedding, I
use a couple of drops of cyclomethicone on each side.


Is it essentially the same as silicone oil? Because cyclomethicone is just 
a category for three different cyclic siloxanes (D4, D5 and D6), namely 
cyclotetrasiloxane, cyclopentasiloxane and cyclohexasiloxane.

D4 and D5 have been put on the ECHA list of forbidden substances in 2018.
So, what exactly do you use? ;-)

Christian


[cctalk] Re: Floppy recovery

2023-06-20 Thread Chuck Guzis via cctalk
On 6/20/23 13:59, Sellam Abraham via cctalk wrote:
> On Tue, Jun 20, 2023 at 1:53 PM Warner Losh via cctalk <
> cctalk@classiccmp.org> wrote:
> 
>> OK. I have just read in a bunch of Rainbow disks. Most of them read fine on
>> the first, second or third try. Some have a sector or three amiss (I've not
>> yet checked to see if those sectors are mapped to the filesystem or not).
>> Some appear to be 'unformatted' though sometimes they read with errors.
>> These disks have what appears to be some kind of grime/mold/??? on their
>> surface.
>>
>> Is there a good way to read these diskettes? To clean the grime off and
>> allow the floppy to spin (they all are super loud)...
>>
>> At the rate things are going, there will be 5-10 of these...

Depends on what's making the noise.  If it's dirt and heavy, I remove
the cookie to a clean jacket after cleaning.  If it's oxide shedding, I
use a couple of drops of cyclomethicone on each side.

Works every time.

--Chuck




[cctalk] Re: Floppy recovery

2023-06-20 Thread Sellam Abraham via cctalk
On Tue, Jun 20, 2023 at 1:53 PM Warner Losh via cctalk <
cctalk@classiccmp.org> wrote:

> OK. I have just read in a bunch of Rainbow disks. Most of them read fine on
> the first, second or third try. Some have a sector or three amiss (I've not
> yet checked to see if those sectors are mapped to the filesystem or not).
> Some appear to be 'unformatted' though sometimes they read with errors.
> These disks have what appears to be some kind of grime/mold/??? on their
> surface.
>
> Is there a good way to read these diskettes? To clean the grime off and
> allow the floppy to spin (they all are super loud)...
>
> At the rate things are going, there will be 5-10 of these...
>
> Warner
>

This rig can do the job ==> https://www.ebay.com/itm/303620862566

Sellam


[cctalk] Floppy recovery

2023-06-20 Thread Warner Losh via cctalk
OK. I have just read in a bunch of Rainbow disks. Most of them read fine on
the first, second or third try. Some have a sector or three amiss (I've not
yet checked to see if those sectors are mapped to the filesystem or not).
Some appear to be 'unformatted' though sometimes they read with errors.
These disks have what appears to be some kind of grime/mold/??? on their
surface.

Is there a good way to read these diskettes? To clean the grime off and
allow the floppy to spin (they all are super loud)...

At the rate things are going, there will be 5-10 of these...

Warner


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-08 Thread Fred Cisin

On Thu, 7 Jan 2016, Charles Anthony wrote:

Putting it a crate with a few hundred other drives...


Label the one next to yours: CONFIDENTIAL : TOP SECRET
or label the one next to yours: TAX RECEIPTS,
and label your drive: REAL TAX RECEIPTS


If you were to label your enemy's drive ISIS, CHILD PORN
would that consume enough resources that they don't bother with yours?





Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-08 Thread William Donzelli
> They are also useful if you are also doing your own high-grade gold refining
> pass, for preparation of material.  The two recycling operators I know are
> probably doing this process as well.

There are some groups now using hammer mills and shaker tables in
order to try and cut down the amount of nasty chemicals involved. The
hammer mills can pulverize the electronics down to something like very
fine sand.

--
Will


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Chuck Guzis

On 01/07/2016 08:17 PM, jwsmobile wrote:


They are also useful if you are also doing your own high-grade gold
refining pass, for preparation of material.  The two recycling
operators I know are probably doing this process as well.  Most gold
recover folks are not trusted.


There are several Youtube clips of these things in operation, including 
one that's being fed vintage Macs.


--Chuck


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread jwsmobile



On 1/7/2016 6:20 PM, Fred Cisin wrote:

On Thu, 7 Jan 2016, drlegendre . wrote:

What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?


Bending the platters will keep them from turning and being usable in 
the drive, but does NOT prevent various other imaging methods.


Breaking a platter in half doesn't prevent those techniques.
There are machines sold to machine document destruction folks that will 
shred the entire drive into pieces the size of large grains of sand.  
They are deployable on trucks with on site document destruction 
services, and I know of two friends here in Orange Country who have 
bought them.


They are also useful if you are also doing your own high-grade gold 
refining pass, for preparation of material.  The two recycling operators 
I know are probably doing this process as well.  Most gold recover folks 
are not trusted.


thanks
jim


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Charles Anthony
On Thu, Jan 7, 2016 at 6:20 PM, Fred Cisin  wrote:

> On Thu, 7 Jan 2016, drlegendre . wrote:
>
>> What's wrong with the "disassemble and rend with heavy hammer" approach?
>> Doesn't that render the platters un-readable, if done with sufficient
>> ardor?
>>
>
> Bending the platters will keep them from turning and being usable in the
> drive, but does NOT prevent various other imaging methods.
>
> Breaking a platter in half doesn't prevent those techniques.
>
> Shattering a glass platter into dozens of pieces doesn't prevent those
> techniques.
>
> breaking it into tiny bits may or may not depending on how much effort
> somebody is willing to put into identifying where each piece came from in
> the platter.
>
> High heat should work.
>
> Sanding all of the rust off of the platter should work.
>
> Mailing the drive to a government office, with a note saying, "please help
> me recover the pictures of my grandmother's birthday party", and having it
> lost in their mailroom might work.
>
>
>
Putting it a crate with a few hundred other drives...

-- Charles


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Fred Cisin

On Thu, 7 Jan 2016, drlegendre . wrote:

What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?


Bending the platters will keep them from turning and being usable in the 
drive, but does NOT prevent various other imaging methods.


Breaking a platter in half doesn't prevent those techniques.

Shattering a glass platter into dozens of pieces doesn't prevent those 
techniques.


breaking it into tiny bits may or may not depending on how much effort 
somebody is willing to put into identifying where each piece came from in 
the platter.


High heat should work.

Sanding all of the rust off of the platter should work.

Mailing the drive to a government office, with a note saying, "please 
help me recover the pictures of my grandmother's birthday party", and 
having it lost in their mailroom might work.






Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Paul Berger

On 2016-01-07 9:06 PM, drlegendre . wrote:

What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?


Or spin the disk and scrape off the oxide,  I have seen disk drive do 
that all by themselves, but as I said earlier modern disks mostly use 
glass platters so you do not even have to disassemble them to smash the 
platters.


Paul.


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread drlegendre .
What's wrong with the "disassemble and rend with heavy hammer" approach?
Doesn't that render the platters un-readable, if done with sufficient
ardor?

On Thu, Jan 7, 2016 at 5:09 PM, Stefan Skoglund (lokal <
stefan.skogl...@agj.net> wrote:

> tor 2016-01-07 klockan 15:08 -0500 skrev Mouse:
> > > Well, if you don't have access to thermite [...]
> >
> > Actually, red heat is well above the Curie temperature for most media,
> > isn't it?  You could chuck the platters into the coals of a bonfire,
> > let them get up to a nice cherry red.  Depending on what the platters
> > are made of, this might even melt them, which should effectively
> > destroy any organization in the material that once formed a thin film
> > on them.  If not, it should demagnetize the coating
>
> Unhealthy.
>
> I would expect that to generate a fair amount of sulphuric and
> hydrochloric acid.
> A fair bit of the shit inside the HD also would end up in the nearby
> soil.
>
>


Re: Floppy recovery

2016-01-07 Thread Guy Sotomayor

> On Jan 7, 2016, at 4:13 PM, Mouse  wrote:
> 
>>> I don't trust the vendor's internal security to keep the key from
>>> leaking and I don't trust the vendor's HR security to prevent
>>> malware authors from making it to the inside, and I *sure* don't
>>> trust the vendor to resist a request from law enforcement [...]
>> I donâ¿¿t know if itâ¿¿s typical or not, but every company that
>> Iâ¿¿ve worked for that has managed crypto-keys has taken key security
>> *very* seriously.
> 
> I find that easy to believe.  However:
> 
> (1) "[E]very company [you]'ve worked for" is almost certainly a heavily
>biased sample; if you have a tenth the clue you appear to, you
>would stay away from the dodgier ones.

Probably.  ;-)

> 
> (2) Taking key security seriously is a very different thing from being
>good at key security.  (They probably correlate positively, but not
>nearly as strongly as one might wish.)
> 

Agree.  In the cases I’m aware of they do both.  ;-)

TTFN - Guy




Re: Floppy recovery

2016-01-07 Thread Mouse
>> I don't trust the vendor's internal security to keep the key from
>> leaking and I don't trust the vendor's HR security to prevent
>> malware authors from making it to the inside, and I *sure* don't
>> trust the vendor to resist a request from law enforcement [...]
> I donâ¿¿t know if itâ¿¿s typical or not, but every company that
> Iâ¿¿ve worked for that has managed crypto-keys has taken key security
> *very* seriously.

I find that easy to believe.  However:

(1) "[E]very company [you]'ve worked for" is almost certainly a heavily
biased sample; if you have a tenth the clue you appear to, you
would stay away from the dodgier ones.

(2) Taking key security seriously is a very different thing from being
good at key security.  (They probably correlate positively, but not
nearly as strongly as one might wish.)

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Re: Floppy recovery

2016-01-07 Thread Guy Sotomayor

> On Jan 7, 2016, at 3:52 PM, Mouse  wrote:
> 
> 
>>> Even if your SED doesn't have a back door or badly implemented
>>> crypto, you also have to worry about whether someone has managed to
>>> install compromised firmware on it.
>> The key here is the use of signed firmware, which I believe is the normal pr$
> 
> That's hardly a fix; all it does is somewhat reduce the pool of people
> who can create the compromised firmware.  I don't trust the vendor's
> internal security to keep the key from leaking and I don't trust the
> vendor's HR security to prevent malware authors from making it to the
> inside, and I *sure* don't trust the vendor to resist a request from
> law enforcement for an easy-to-access backdoor (which will, of course,
> promptly get abused, either by others or for other purposes).
> 

I don’t know if it’s typical or not, but every company that I’ve worked for that
has managed crypto-keys has taken key security *very* seriously.  For example,
the key generating system (usually something custom) is kept in an “air gapped”
vault (and I *do* mean vault).  The vault can only be opened when two authorized
individuals are present (ie neither one can get into the vault without the 
other).
Everything is tracked and audited on a regular basis.

One big semi-conductor company does it this way (I have personal knowledge).
I also helped set up this type of crypo-key management for one of the startups 
I 
worked for once upon a time (even to the point where they crypto-key hardware
would “self destruct” if tampered with…sorry no sparks, smoke or other visual
aids…it just erased itself).

TTFN - Guy



Re: Floppy recovery

2016-01-07 Thread Mouse
>>> If you want data security and don't like destroying your hardware,
>>> SED ("sel$
>> You're assuming that the SED doesn't store an extra copy of the
>> decryption key in NVM or on the medium.

That was my initial reaction too!

>> Also, reverse-engineering has shown that at least some SEDs have
>> very bad crypto implementations.

I was not aware of that, but (and this is a depressing commentary on
_something_) it does not surprise me in the least.

>> Even if your SED doesn't have a back door or badly implemented
>> crypto, you also have to worry about whether someone has managed to
>> install compromised firmware on it.
> The key here is the use of signed firmware, which I believe is the normal pr$

That's hardly a fix; all it does is somewhat reduce the pool of people
who can create the compromised firmware.  I don't trust the vendor's
internal security to keep the key from leaking and I don't trust the
vendor's HR security to prevent malware authors from making it to the
inside, and I *sure* don't trust the vendor to resist a request from
law enforcement for an easy-to-access backdoor (which will, of course,
promptly get abused, either by others or for other purposes).

/~\ The ASCII Mouse
\ / Ribbon Campaign
 X  Against HTMLmo...@rodents-montreal.org
/ \ Email!   7D C8 61 52 5D E7 2D 39  4E F1 31 3E E8 B3 27 4B


Re: Secure disk destruction [was Re: Floppy recovery]

2016-01-07 Thread Stefan Skoglund (lokal
tor 2016-01-07 klockan 15:08 -0500 skrev Mouse: 
> > Well, if you don't have access to thermite [...]
> 
> Actually, red heat is well above the Curie temperature for most media,
> isn't it?  You could chuck the platters into the coals of a bonfire,
> let them get up to a nice cherry red.  Depending on what the platters
> are made of, this might even melt them, which should effectively
> destroy any organization in the material that once formed a thin film
> on them.  If not, it should demagnetize the coating

Unhealthy.

I would expect that to generate a fair amount of sulphuric and
hydrochloric acid.
A fair bit of the shit inside the HD also would end up in the nearby
soil.



Re: Floppy recovery

2016-01-07 Thread Paul Koning

> On Jan 7, 2016, at 3:33 PM, Eric Smith  wrote:
> 
> On Thu, Jan 7, 2016 at 1:17 PM, Paul Koning  wrote:
>> If you want data security and don't like destroying your hardware, SED 
>> ("self-encrypting drives") are a solution. Those encrypt all data, and 
>> "erase" by discarding and replacing the data encryption key.  So all your 
>> sectors instantly turn to random noise.  SSD versions of those are starting 
>> to appear, which addresses the invisible old copies problem that regular 
>> SSDs have.  The great thing of an SED is not just the security of its erase 
>> function, but in particular the speed: it takes only seconds to destroy all 
>> the data on the drive.
> 
> You're assuming that the SED doesn't store an extra copy of the
> decryption key in NVM or on the medium. IMO, that's a very naive
> assumption. Also, reverse-engineering has shown that at least some
> SEDs have very bad crypto implementations.

True.  I know of at least one first generation SED that uses ECB mode.  Anyone 
who has looked at IEEE 802.11 knows that cryptographic competence is not 
common, and that some of the people designing cryptosystems are not only 
unqualified to do so, but sufficiently ignorant that the aren't even aware that 
they aren't qualified.

With SEDs as with any other security tool, one has to be sceptical and ask very 
pointed questions.  For example, with the SSD kind, I probed deeply into how 
the key is replaced in a "crypto erase" operation, down to the level of the 
flash memory primitives involved.  The particular implementation I looked at 
had the correct answers.

> Even if your SED doesn't have a back door or badly implemented crypto,
> you also have to worry about whether someone has managed to install
> compromised firmware on it. People once thought that hacked drive
> firmware was too difficult or expensive to develop for anyone other
> than three-letter agencies, but that's been proven false.

The key here is the use of signed firmware, which I believe is the normal 
practice.  With that, it's not just a matter of reverse engineering, the 
attacker would also have to steal the firmware signing key.

> I'm OK with an SED being a component of the data security solution,
> but I'm not willing to count on it exclusively. I'll still run
> software disk encryption. Preferably open-source software disk
> encryption, so that the source code can be audited, though that's not
> a guarantee either.

Agreed.  I've been a TrueCrypt user ever since DriveCrypt went off track.

> One might expect that simple security measures would be enough as long
> as the threat model you're concerned with isn't three-letter agencies.
> Unfortunately any back doors or badly implemented crypto, whether
> installed by TLAs or just through incompetence, are likely to be
> exploited by many miscreants, not just TLAs.
> 
> If your threat model IS three-letter agencies, you're basically doomed
> from the outset.

Maybe so.  But you can definitely make things much harder, which is worth doing.

paul



Re: Floppy recovery

2016-01-07 Thread Eric Smith
On Thu, Jan 7, 2016 at 1:17 PM, Paul Koning  wrote:
> If you want data security and don't like destroying your hardware, SED 
> ("self-encrypting drives") are a solution. Those encrypt all data, and 
> "erase" by discarding and replacing the data encryption key.  So all your 
> sectors instantly turn to random noise.  SSD versions of those are starting 
> to appear, which addresses the invisible old copies problem that regular SSDs 
> have.  The great thing of an SED is not just the security of its erase 
> function, but in particular the speed: it takes only seconds to destroy all 
> the data on the drive.

You're assuming that the SED doesn't store an extra copy of the
decryption key in NVM or on the medium. IMO, that's a very naive
assumption. Also, reverse-engineering has shown that at least some
SEDs have very bad crypto implementations.

Even if your SED doesn't have a back door or badly implemented crypto,
you also have to worry about whether someone has managed to install
compromised firmware on it. People once thought that hacked drive
firmware was too difficult or expensive to develop for anyone other
than three-letter agencies, but that's been proven false.

I'm OK with an SED being a component of the data security solution,
but I'm not willing to count on it exclusively. I'll still run
software disk encryption. Preferably open-source software disk
encryption, so that the source code can be audited, though that's not
a guarantee either.

One might expect that simple security measures would be enough as long
as the threat model you're concerned with isn't three-letter agencies.
Unfortunately any back doors or badly implemented crypto, whether
installed by TLAs or just through incompetence, are likely to be
exploited by many miscreants, not just TLAs.

If your threat model IS three-letter agencies, you're basically doomed
from the outset.


Re: Floppy recovery

2016-01-07 Thread Paul Koning

> On Jan 7, 2016, at 1:13 PM, Chuck Guzis  wrote:
> 
> On 01/07/2016 09:36 AM, Fred Cisin wrote:
> 
>> I've heard that there are "standards" for a number of overwrites, and
>> what patterns to use, . . .
> 
> The paper that got the most notice was from Peter Gutmann from the early 90s.
> 
> https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

Oh yes, one of my favorite topics.  I get a lot of questions where people refer 
to "the DoD wiping standard".  Unfortunately, there isn't one.  There are some 
very old documents that give suggestions, but those seem to have expired long 
ago.  Gutmann's document is similarly old.  Any decade-old rule suffers from 
the fact that drive technology has changed drastically, and considerations that 
were valid then are no longer valid.  Gutmann did great work at the time, and 
his contribution deserves to be honored, but it has very much been superseded 
by technology change.  Tracks are so much smaller and margins so tiny that 
multiple erasures don't add much if anything.

On the other hand, block replacement, and especially the write remapping done 
by SSDs, can leave stuff in places you can't even see until you take the device 
apart.  In fact, hard drives are not much of an issue, but SSDs should make you 
worry.

Incineration should work, but use enough heat.  Shredding is questionable, 
unless the particles are very small.  I think high end shredders are required 
to produce particles less than 1/32 inch in size.

Much more recent work on erase was done by Gordon Hughes at UCSD.  See 
http://cmrr.ucsd.edu/people/Hughes/secure-erase.html for more.

If you want data security and don't like destroying your hardware, SED 
("self-encrypting drives") are a solution. Those encrypt all data, and "erase" 
by discarding and replacing the data encryption key.  So all your sectors 
instantly turn to random noise.  SSD versions of those are starting to appear, 
which addresses the invisible old copies problem that regular SSDs have.  The 
great thing of an SED is not just the security of its erase function, but in 
particular the speed: it takes only seconds to destroy all the data on the 
drive.

paul




Re: Floppy recovery

2016-01-07 Thread Mike Stein
- Original Message - 
From: "Fred Cisin" 
To: "General Discussion: On-Topic and Off-Topic Posts" 
Sent: Thursday, January 07, 2016 1:58 PM
Subject: Re: Floppy recovery


>>> I've heard that there are "standards" for a number of overwrites, and
>>>  what patterns to use, . . .
> 
> On Thu, 7 Jan 2016, Chuck Guzis wrote:
>> The paper that got the most notice was from Peter Gutmann from the early 90s.
>> https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html
> 
> Thank you!
> 
> That answers most of our ignorant questions.
> 
> 
> I wonder what the cost is to do those techniques.
> 

Well, if you don't have access to thermite or even a large sledgehammer then 
this recommendation of his might be a cost-effective solution:

http://www.diskstroyer.com/Home.html

Even if you do have that sledgehammer this might be useful as a preprocessing 
step before final treatment with the aforementioned hammer.

I'm fortunate in already having some of the tools in this kit and some 
experience in their use and I can highly recommend this technique, not only for 
data destruction but also for relaxation and a source of various unique parts.

I wonder how many of those clocks made from HD platters contain sensitive 
information; definitely something else to worry about...

;-)


Re: Floppy recovery

2016-01-07 Thread Fred Cisin

I've heard that there are "standards" for a number of overwrites, and
 what patterns to use, . . .


On Thu, 7 Jan 2016, Chuck Guzis wrote:

The paper that got the most notice was from Peter Gutmann from the early 90s.
https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html


Thank you!

That answers most of our ignorant questions.


I wonder what the cost is to do those techniques.





Re: Floppy recovery

2016-01-07 Thread Chuck Guzis

On 01/07/2016 09:36 AM, Fred Cisin wrote:


I've heard that there are "standards" for a number of overwrites, and
 what patterns to use, . . .


The paper that got the most notice was from Peter Gutmann from the early 
90s.


https://www.cs.auckland.ac.nz/~pgut001/pubs/secure_del.html

--Chuck



Re: Floppy recovery

2016-01-07 Thread Fred Cisin
1) if the alignment of the head of the original recording and of the 
overwrite head are not a perfect match, then there can be some residual 
data somewhat off axis.


On Thu, 7 Jan 2016, Christian Corti wrote:
At a first thought I don't see how there can be residual data because there 
is the tunnel erase head after the R/W head. The drives must be very 
misaligned (i.e. more than the width of one erase half) to still have 
residual data.


Yes, that makes sense.  But, the erase head probably doesn't scramble the 
weak residual flux transitions as much as overwriting does.


2) if the data was overwritten once, with a known pattern, then somebody 
with sufficient resources and motivation can attempt to analyze the noise, 
and determine "what, overwritten by a 0 could produce the noise that we 
have here."  Accordingly, there are guvmint standards of MULTIPLE patterns 
to

That is why you don't take /dev/zero but /dev/[u]random for overwriting data.


Even then, since the s'posedly random data that was used for overwrite is 
still readable, leading to, "OK, here's what's currently on it, what prior 
recording would generate THIS background noise?", thus, a scond overwrite 
of a different pattern would render it past any "reasonable" efforts.
I've heard that there are "standards" for a number of overwrites, and what 
patterns to use, . . .


But, as I mentioned before, the most thorough protection of all, is to be 
too boring for it to be worth any effort at all.
'Course extremely violent total destruction of the drive has its own 
emotional benefit!



I suspect that most of the stuff that impresses the hell out of outsiders 
to the field is really nothing more than patching DIRectories to "UNERASE" 
files that haven't even been overwritten.




Re: Floppy recovery

2016-01-07 Thread Christian Corti

On Tue, 5 Jan 2016, Fred Cisin wrote:
1) if the alignment of the head of the original recording and of the 
overwrite head are not a perfect match, then there can be some residual data 
somewhat off axis.


At a first thought I don't see how there can be residual data because 
there is the tunnel erase head after the R/W head. The drives must be very 
misaligned (i.e. more than the width of one erase half) to still have 
residual data.


2) if the data was overwritten once, with a known pattern, then somebody with 
sufficient resources and motivation can attempt to analyze the noise, and 
determine "what, overwritten by a 0 could produce the noise that we have 
here."  Accordingly, there are guvmint standards of MULTIPLE patterns to


That is why you don't take /dev/zero but /dev/[u]random for overwriting 
data.


Christian


Re: Floppy recovery

2016-01-05 Thread Chris Elmquist


On January 5, 2016 3:30:11 PM CST, Ethan Dicks  wrote:
>On Tue, Jan 5, 2016 at 4:27 PM, Chuck Guzis  wrote:
>>> Can you enlighten us as to what sort of system/disk format it was?
>>
>> IIRC, it was several, mostly Japanese.  I'd have to go back to my
>notes from
>> some time back.
>
>The picture of the one remaining whitebox with the two full-height
>floppy drives did remind me of some of the early-to-mid-1980s Japanese
>CP/M machines that were all but gone by 1985.
>
>-ethan

so, is it believed that that is a picture of an actual machine involved?  
because that machine looks EXACTLY like a CP/M machine we built here in MN 
around 1979 at a company called Multi-Tech Systems (the modem people).  It was 
a clone of a design done by another company called R2E which I seem to remember 
being French.  The system initially used Micropolis 77 track, 100 TPI drives 
and a Micropolis controller design that was also used in Vector Graphic 
machines.  Toward the end of that product's life at Multi-Tech, it had been 
upgraded to a GCR controller, with the same drives, and that controller had 
more horsepower than the host machine it plugged into :-). Machine was called 
MT-500 and was 64K Z80 at 4 MHz with (4) S-100 slots on the single board.  
Video was 8275 CRT controller and the tubes were usually amber.  I still have 
one of these machines but without the ~40 lb cabinet it was usually built in.

Sure looks similar to me.

-- 
Chris Elmquist


Re: Floppy recovery

2016-01-05 Thread Peter Cetinski

>> On 01/05/2016 1:15 PM, Ali wrote:
>> Anyone know anything about the custom computer and the custom OS? Nor 
>> implying anything but Chuck do u have any insights? ;)

> Didn't Scotty leave his laptop behind when they were saving the whales?

  "Hello, computer!"

Re: Floppy recovery

2016-01-05 Thread John Robertson

On 01/05/2016 1:15 PM, Ali wrote:

Anyone know anything about the custom computer and the custom OS? Nor implying 
anything but Chuck do u have any insights? ;)

Didn't Scotty leave his laptop behind when they were saving the whales?

John ;-#)#


Re: Floppy recovery

2016-01-05 Thread Chuck Guzis

On 01/05/2016 03:00 PM, Fred Cisin wrote:


NSA has done substantial serious research on that and other recovery.
1) if the alignment of the head of the original recording and of the
overwrite head are not a perfect match, then there can be some residual
data somewhat off axis.



2) if the data was overwritten once, with a known pattern, then somebody
with sufficient resources and motivation can attempt to analyze the
noise, and determine "what, overwritten by a 0 could produce the noise
that we have here."  Accordingly, there are guvmint standards of
MULTIPLE patterns to overwrite with to render such extreme techniques
unusable.

However, I will heartily agree that recovery ceases to be PRACTICAL.


I recall reading (back in the 90s, that various labs were fooling with 
this wrt hard disks of the timeand that any success was extremely small 
potatoes. i.e. maybe a kilobit per hour and not 100% by any means.


We have easier ways now, thanks to the Patriot Act.  More personal.

When folks would ask me how to completely erase a hard disk, I suggested 
that bashing it to junk using a good sledge hammer or running it through 
a log chipper then burning the pieces was a good start.


On the other hand, simply shredding floppies isn't good enough.  There 
was an old "The New Explorers" program on putting floppies back together 
and getting data.  I know the people who did it--in one of the shots in 
the background, you can see Anadisk running.


I suggest letting floppies soak for a week in a barrel of diesel, then 
setting fire to them should do the trick.


The old maxim of "you don't know what you've got 'til it's gone" applies 
to data recovery as well.


--Chuck



Re: Floppy recovery --> Harlan Ellison

2016-01-05 Thread jwsmobile



On 1/5/2016 2:03 PM, Jason Scott wrote:

I threw it to 50-50 when I weighed in the possibility that he might find an
organization willing to pay him something ridiculous to have the archive
posthumously. If that doesn't happen, yeah, 90-10.

On Tue, Jan 5, 2016 at 4:58 PM, Rich Alderson <
ri...@livingcomputermuseum.org> wrote:


From: Jason Scott
Sent: Tuesday, January 05, 2016 1:53 PM







meone who's dealt with Harlan Ellison on multiple fronts. I will
tell

you the chances he will burn those drawers is 50-50.

Though I've never met him, I have friends who have worked for him.  We
would
put it at 90-10.

 Rich


Rich Alderson



I thought about him in the last few years as such as what has happened 
with Heinlein and the like being an example of not having your wishes 
followed.


He was certainly in fine form when he came to UCI so many years ago, and 
I recall vaguely that he was not going to leave anything of that 
behind.  I'd hope that as remarkable as his works have been that he does 
reconsider any decision to destroy the material.


I probably won't be around long enough to see anything meaningful come 
out of anyone trying to make sense of things, but he is definitely 
someone who puts out things that get your thought processes going.  And 
a 2 hour + lecture was good enough I still recall it these many years 
later.  It was really exciting to have read the things that I had before 
that time.  I only wish I'd have know of more of the Star Trek and other 
stuff that was and had recently happened near the time of the lecture to 
have brought that up.


I do know there were people who had followed him there that he put off 
discussing things with, and I suspect that was what they wanted to bring up.


thanks
jim


Re: Floppy recovery

2016-01-05 Thread Fred Cisin

On Tue, 5 Jan 2016, et...@757.org wrote:
If a disk has all zeros written to it, as far as I know from what I've read 
there is no hope of recovering the data. There were rumors that the 
government could do it based on really fine detection of magnetic levels or 
something -- but it was rumor. There are bounties out there if anyone can 
pull it off.


I will heartily agree that recovery ceases to be PRACTICAL.

NSA has done substantial serious research on that and other recovery.
1) if the alignment of the head of the original recording and of the 
overwrite head are not a perfect match, then there can be some residual 
data somewhat off axis.
2) if the data was overwritten once, with a known pattern, then somebody 
with sufficient resources and motivation can attempt to analyze the noise, 
and determine "what, overwritten by a 0 could produce the noise that we 
have here."  Accordingly, there are guvmint standards of MULTIPLE patterns 
to overwrite with to render such extreme techniques unusable.


However, I will heartily agree that recovery ceases to be PRACTICAL.


I understand data can be recovered when the file entry is removed from an 
allocation table but data has not been zereod/randomly written over.


truly trivial.


tl;dr: single pass is fine -- no need to triple pass erase.


THAT depends on who is after you.   I don't do anything interesting enough 
to warrant using a simplistic trivial UNERASE utility.  (Which is what 
launched Norton fUtilities)

NSA is not interested in what I am doing.






Re: Floppy recovery

2016-01-05 Thread Ethan Dicks
On Tue, Jan 5, 2016 at 4:58 PM, Rich Alderson
 wrote:
> From: Jason Scott
> Sent: Tuesday, January 05, 2016 1:53 PM
>> As someone who's dealt with Harlan Ellison on multiple fronts. I will tell
>> you the chances he will burn those drawers is 50-50.
>
> Though I've never met him, I have friends who have worked for him.  We would
> put it at 90-10.

>From what I've heard, that's far more likely.

-ethan


Re: Floppy recovery

2016-01-05 Thread Jerome H. Fine

>et...@757.org wrote:

If a disk has all zeros written to it, as far as I know from what I've 
read there is no hope of recovering the data. There were rumors that 
the government could do it based on really fine detection of magnetic 
levels or something -- but it was rumor. There are bounties out there 
if anyone can pull it off.


I understand data can be recovered when the file entry is removed from 
an allocation table but data has not been zereod/randomly written over.


tl;dr: single pass is fine -- no need to triple pass erase.


Since this thread has been focused on Floppy media, my assumption
is that writing all zeros does not refer to a hard disk drive.  Is my
assumption incorrect?

I have a (exactly!!) one GB file with all zeros (obviously not a floppy)
on my hard drive.  If I fill the remaining storage with copies of this
file, does that eliminate recovery from that portion of the hard drive?

And since I have two physical hard drives, copying from a one GB
file from one physical drive to the other physical drive usually
takes only about one minute, so it would be quite an efficient
method to destroy any old data.

Jerome Fine


Re: Floppy recovery

2016-01-05 Thread Jason Scott
I threw it to 50-50 when I weighed in the possibility that he might find an
organization willing to pay him something ridiculous to have the archive
posthumously. If that doesn't happen, yeah, 90-10.

On Tue, Jan 5, 2016 at 4:58 PM, Rich Alderson <
ri...@livingcomputermuseum.org> wrote:

> From: Jason Scott
> Sent: Tuesday, January 05, 2016 1:53 PM
>
> > On Tue, Jan 5, 2016 at 3:27 PM, jwsmobile > wrote:
>
> >> On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope all
> of
> >> his papers are preserved and transcribed.  He had about 15 4 drawer
> >> cabinets of work notes at that time, probably double or triple that
> now.  I
> >> think at the time he worked manually as well.
>
> > As someone who's dealt with Harlan Ellison on multiple fronts. I will
> tell
> > you the chances he will burn those drawers is 50-50.
>
> Though I've never met him, I have friends who have worked for him.  We
> would
> put it at 90-10.
>
> Rich
>
>
> Rich Alderson
> Vintage Computing Sr. Systems Engineer
> Living Computer Museum
> 2245 1st Avenue S
> Seattle, WA 98134
>
> mailto:ri...@livingcomputermuseum.org
>
> http://www.LivingComputerMuseum.org/
>


RE: Floppy recovery

2016-01-05 Thread Rich Alderson
From: Jason Scott
Sent: Tuesday, January 05, 2016 1:53 PM

> On Tue, Jan 5, 2016 at 3:27 PM, jwsmobile > wrote:

>> On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope all of
>> his papers are preserved and transcribed.  He had about 15 4 drawer
>> cabinets of work notes at that time, probably double or triple that now.  I
>> think at the time he worked manually as well.

> As someone who's dealt with Harlan Ellison on multiple fronts. I will tell
> you the chances he will burn those drawers is 50-50.

Though I've never met him, I have friends who have worked for him.  We would
put it at 90-10.

Rich


Rich Alderson
Vintage Computing Sr. Systems Engineer
Living Computer Museum
2245 1st Avenue S
Seattle, WA 98134

mailto:ri...@livingcomputermuseum.org

http://www.LivingComputerMuseum.org/


Re: Floppy recovery

2016-01-05 Thread ethan

of hundreds of drives (cloud), SSD, Smart Phones, etc. This includes those
that have been purposely or accidentally erased and/or physically
damaged.


If a disk has all zeros written to it, as far as I know from what I've 
read there is no hope of recovering the data. There were rumors that the 
government could do it based on really fine detection of magnetic levels 
or something -- but it was rumor. There are bounties out there if anyone 
can pull it off.


I understand data can be recovered when the file entry is removed from an 
allocation table but data has not been zereod/randomly written over.


tl;dr: single pass is fine -- no need to triple pass erase.




Re: Floppy recovery

2016-01-05 Thread Jason Scott
As someone who's dealt with Harlan Ellison on multiple fronts. I will tell
you the chances he will burn those drawers is 50-50.

On Tue, Jan 5, 2016 at 3:27 PM, jwsmobile  wrote:

>
> I wonder how it could take them three months to figure something out.
> Maybe Chuck can comment.
>
> But over a year after they spent the 3 months.  Hmmm.  It will be
> interesting to hear what was recovered, though from what has been written
> and passed down about Roddenberry, I'm not expecting much.
>
> On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope all of
> his papers are preserved and transcribed.  He had about 15 4 drawer
> cabinets of work notes at that time, probably double or triple that now.  I
> think at the time he worked manually as well.
>
> https://www.yahoo.com/tech/floppy-disks-star-trek-creator-182855583.html
>
> Thanks
> Jim
>


Re: Floppy recovery

2016-01-05 Thread Chuck Guzis

On 01/05/2016 12:56 PM, Terry Stewart wrote:


Yes, I would have thought an old MSDOS machine with a 360k 5.25 inch
floppy drive plus Chuck's 22DISK program and the job could have been
done in a day?  Might be more too it than it seems maybe...


I won't comment much other than to say that Mr. Roddenberry was 
apparently a laptop/portable aficionado, so some of the floppy formats 
had never crossed my desk before.  I did do DS a favor by recovering 
erased data as well.  In addition to the usual fees, we received a nice 
box of chocolate, which was welcome.


I'm too old to care about credit.  The Roddenberry people had, years 
before, purchased 22Disk from us as well, so they might have been able 
to do the work themselves.


--Chuck




Re: Floppy recovery

2016-01-05 Thread Ethan Dicks
On Tue, Jan 5, 2016 at 4:27 PM, Chuck Guzis  wrote:
>> Can you enlighten us as to what sort of system/disk format it was?
>
> IIRC, it was several, mostly Japanese.  I'd have to go back to my notes from
> some time back.

The picture of the one remaining whitebox with the two full-height
floppy drives did remind me of some of the early-to-mid-1980s Japanese
CP/M machines that were all but gone by 1985.

-ethan


Re: Floppy recovery

2016-01-05 Thread Ethan Dicks
On Tue, Jan 5, 2016 at 4:24 PM, Lyle Bickley  wrote:
> I'm somewhat familiar with the Roddenberry floppies. They were not in a
> standard format - so it was not just a matter of reading the floppies,
> but developing software to read the specially formatted and encoded
> floppies (understanding directories, files, etc.) and converting them
> to files in a format their client could use.

Since the article in PC world mentioned that most of the floppies were
"in CP/M format", and I know there are many possible ways to make flux
transitions on spinning rust, I totally get that it can take some time
to figure out where the actual bits are on the medium, but once you
have the data portion of the sectors on a modern machine, CP/M wasn't
all that complicated, and IIRC, files were on sequential blocks once
they started (not scattered about such as with most modern
filesystems), knowing that you were starting with something based on
CP/M, what was so obscure that it took months to untangle that part?

-ethan


Re: Floppy recovery

2016-01-05 Thread Chuck Guzis

On 01/05/2016 01:21 PM, Fred Cisin wrote:

On Tue, 5 Jan 2016, Chuck Guzis wrote:

Guess who Drivesavers sent the floppy images to for recovery?
(Modesty forbids).  But we've had a working relationship with them
for a long time.


Can you enlighten us as to what sort of system/disk format it was?


IIRC, it was several, mostly Japanese.  I'd have to go back to my notes 
from some time back.


--Chuck


Re: Floppy recovery

2016-01-05 Thread Warner Losh
Attempting to read floppies with the wrong kind of drive can also
cause damage. Back in the day, people were all aflutter about
drive rings and how having them or not having them caused
damage when they read the floppy in a 'foreign' setting. There
were rumors about head clearance and such also being an issue
when newer drives were used to read older floppies, but I never
could find someone that was actually affected by it.

Warner

On Tue, Jan 5, 2016 at 2:07 PM, Terry Stewart 
wrote:

> >200 disks, especially if they weren't in great shape, can take some time.
> I assume they wanted full data recovery using all possible means,
> >plus conversion of all the documents to a modern format.
>
> With one-of-a-kind stuff, you don't have the luxury of experimenting and
> playing around with it. You have to make sure you aren't
> >destroying them further while trying to read them- sometimes you only get
> one chance and the mylar coating comes right off. After that, it's over.
>
> Fair point.  Thinking further on it, it would be a softly, softly approach.
>
> Terry (Tez)
>
> On Wed, Jan 6, 2016 at 10:03 AM, peter  wrote:
>
> > On 2016-01-05 15:56, Terry Stewart wrote:
> >
> >> I wonder how it could take them three months to figure something out.
> >>>
> >> Maybe Chuck can comment.
> >>
> >> Yes, I would have thought an old MSDOS machine with a 360k 5.25 inch
> >> floppy
> >> drive plus Chuck's 22DISK program and the job could have been done in a
> >> day?  Might be more too it than it seems maybe...
> >>
> >> Terry (Tez)
> >>
> >
> > 200 disks, especially if they weren't in great shape, can take some time.
> > I assume they wanted full data recovery using all possible means, plus
> > conversion of all the documents to a modern format.
> >
> > With one-of-a-kind stuff, you don't have the luxury of experimenting and
> > playing around with it. You have to make sure you aren't destroying them
> > further while trying to read them- sometimes you only get one chance and
> > the mylar coating comes right off. After that, it's over.
> >
> > --
> > --
> > Pete Rittwage
> > Disk Preservation Project
> > http://diskpreservation.com
> >
> >
>


Re: Floppy recovery

2016-01-05 Thread Lyle Bickley
On Tue, 5 Jan 2016 12:27:31 -0800
jwsmobile  wrote:

> I wonder how it could take them three months to figure something out.  
> Maybe Chuck can comment.
> 
> But over a year after they spent the 3 months.  Hmmm.  It will be 
> interesting to hear what was recovered, though from what has been 
> written and passed down about Roddenberry, I'm not expecting much.
> 
> On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope all 
> of his papers are preserved and transcribed.  He had about 15 4 drawer 
> cabinets of work notes at that time, probably double or triple that 
> now.  I think at the time he worked manually as well.
> 
> https://www.yahoo.com/tech/floppy-disks-star-trek-creator-182855583.html

I'm very familiar with DriveSavers. They are a professional forensically
qualified firm (you can review all their certifications on their website).

Many three letter government agencies, law firms and Hollywood studios,
etc. use them to forensically retrieve information from FDD, HDD, Arrays
of hundreds of drives (cloud), SSD, Smart Phones, etc. This includes those
that have been purposely or accidentally erased and/or physically
damaged.

I have visited their facilities in Novato, California - and they are
truly amazing. I've seldom seen such a capable, quality operation.

I'm somewhat familiar with the Roddenberry floppies. They were not in a
standard format - so it was not just a matter of reading the floppies,
but developing software to read the specially formatted and encoded
floppies (understanding directories, files, etc.) and converting them
to files in a format their client could use.

Cheers,
Lyle 
-- 
73  AF6WS
Bickley Consulting West Inc.
http://bickleywest.com

"Black holes are where God is dividing by zero"


Re: Floppy recovery

2016-01-05 Thread peter

On 2016-01-05 15:56, Terry Stewart wrote:

I wonder how it could take them three months to figure something out.

Maybe Chuck can comment.

Yes, I would have thought an old MSDOS machine with a 360k 5.25 inch 
floppy

drive plus Chuck's 22DISK program and the job could have been done in a
day?  Might be more too it than it seems maybe...

Terry (Tez)


200 disks, especially if they weren't in great shape, can take some 
time. I assume they wanted full data recovery using all possible means, 
plus conversion of all the documents to a modern format.


With one-of-a-kind stuff, you don't have the luxury of experimenting and 
playing around with it. You have to make sure you aren't destroying them 
further while trying to read them- sometimes you only get one chance and 
the mylar coating comes right off. After that, it's over.


--
--
Pete Rittwage
Disk Preservation Project
http://diskpreservation.com



Re: Floppy recovery

2016-01-05 Thread Fred Cisin

On Tue, 5 Jan 2016, Chuck Guzis wrote:
Guess who Drivesavers sent the floppy images to for recovery?  (Modesty 
forbids).  But we've had a working relationship with them for a long time.


Can you enlighten us as to what sort of system/disk format it was?





RE: Floppy recovery

2016-01-05 Thread Ali
Anyone know anything about the custom computer and the custom OS? Nor implying 
anything but Chuck do u have any insights? ;)

 Original message 
From: jwsmobile  
Date: 1/5/2016  12:27 PM  (GMT-08:00) 
To: "General Discussion: On-Topic and Off-Topic Posts"  
Subject: Floppy recovery 


I wonder how it could take them three months to figure something out.  
Maybe Chuck can comment.

But over a year after they spent the 3 months.  Hmmm.  It will be 
interesting to hear what was recovered, though from what has been 
written and passed down about Roddenberry, I'm not expecting much.

On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope all 
of his papers are preserved and transcribed.  He had about 15 4 drawer 
cabinets of work notes at that time, probably double or triple that 
now.  I think at the time he worked manually as well.

https://www.yahoo.com/tech/floppy-disks-star-trek-creator-182855583.html

Thanks
Jim


Re: Floppy recovery

2016-01-05 Thread Terry Stewart
>200 disks, especially if they weren't in great shape, can take some time.
I assume they wanted full data recovery using all possible means,
>plus conversion of all the documents to a modern format.

With one-of-a-kind stuff, you don't have the luxury of experimenting and
playing around with it. You have to make sure you aren't
>destroying them further while trying to read them- sometimes you only get
one chance and the mylar coating comes right off. After that, it's over.

Fair point.  Thinking further on it, it would be a softly, softly approach.

Terry (Tez)

On Wed, Jan 6, 2016 at 10:03 AM, peter  wrote:

> On 2016-01-05 15:56, Terry Stewart wrote:
>
>> I wonder how it could take them three months to figure something out.
>>>
>> Maybe Chuck can comment.
>>
>> Yes, I would have thought an old MSDOS machine with a 360k 5.25 inch
>> floppy
>> drive plus Chuck's 22DISK program and the job could have been done in a
>> day?  Might be more too it than it seems maybe...
>>
>> Terry (Tez)
>>
>
> 200 disks, especially if they weren't in great shape, can take some time.
> I assume they wanted full data recovery using all possible means, plus
> conversion of all the documents to a modern format.
>
> With one-of-a-kind stuff, you don't have the luxury of experimenting and
> playing around with it. You have to make sure you aren't destroying them
> further while trying to read them- sometimes you only get one chance and
> the mylar coating comes right off. After that, it's over.
>
> --
> --
> Pete Rittwage
> Disk Preservation Project
> http://diskpreservation.com
>
>


Re: Floppy recovery

2016-01-05 Thread Chuck Guzis

On 01/05/2016 12:27 PM, jwsmobile wrote:


I wonder how it could take them three months to figure something out.
 Maybe Chuck can comment.

But over a year after they spent the 3 months.  Hmmm.  It will be
interesting to hear what was recovered, though from what has been
written and passed down about Roddenberry, I'm not expecting much.

On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope
all of his papers are preserved and transcribed.  He had about 15 4
drawer cabinets of work notes at that time, probably double or triple
that now.  I think at the time he worked manually as well.

https://www.yahoo.com/tech/floppy-disks-star-trek-creator-182855583.html


Guess who Drivesavers sent the floppy images to for recovery?  (Modesty 
forbids).  But we've had a working relationship with them for a long time.


--Chuck



Re: Floppy recovery

2016-01-05 Thread Terry Stewart
>I wonder how it could take them three months to figure something out.
Maybe Chuck can comment.

Yes, I would have thought an old MSDOS machine with a 360k 5.25 inch floppy
drive plus Chuck's 22DISK program and the job could have been done in a
day?  Might be more too it than it seems maybe...

Terry (Tez)


Floppy recovery

2016-01-05 Thread jwsmobile


I wonder how it could take them three months to figure something out.  
Maybe Chuck can comment.


But over a year after they spent the 3 months.  Hmmm.  It will be 
interesting to hear what was recovered, though from what has been 
written and passed down about Roddenberry, I'm not expecting much.


On a tangent, from a lecture 35 years ago by Harlan Ellison, I hope all 
of his papers are preserved and transcribed.  He had about 15 4 drawer 
cabinets of work notes at that time, probably double or triple that 
now.  I think at the time he worked manually as well.


https://www.yahoo.com/tech/floppy-disks-star-trek-creator-182855583.html

Thanks
Jim